![]() V) Upload the keystore files to the Secure API s3 Bucket and also to the directory specified on the worker nodes (this is executed as part of the terraform script) Iv) Create a JKS file for the truststore and add the root and intermediate certificates Iii) Download DigiCert Root and Intermediate Certificates from The Digicert Portal Keytool -importkeystore -srckeystore -srcstoretype pkcs12 - destkeystore comp-dev-keystore.jks -deststoretype JKS ![]() Ii) Convert certificate from pfx to keystore jks using the following command: pfx client certificate from the Comp admin portal Openssl x509 -inform der -in gen/qa_r -out gen/qa_cert.pem 2.) Apply DigiCert certificate to the Switch Environment Keytool -export -alias apis01.qa -file gen/qa_r -keystore cert_keystore.jks Openssl pkcs12 -in gen/qa_keystore.p12 -nodes -nocerts -out gen/qa_key.key Keytool -importkeystore -alias apis01.qa -srckeystore cert_keystore.jks -destkeystore gen/qa_keystore.p12 -deststoretype PKCS12 <<”sandbox.p7r”<< d.) Generate the PEM and key with the following keytool and openssl commands Back to the sandbox keypair, right click sandbox keypair and select “import CA reply”.On intermediate cert that is in the main keystore, right click and choose Sign CSR,.Right click key pair and choose “Export CSR” and save in file >”sandbox.csr”>.Set subject alternative name to the domain name “sandbox”.Import all three “cer” certificate back into the empty jks created above and then save to file in jks format.
0 Comments
Leave a Reply. |