Skip to main content

Generate JKS files

** In this case I use self-signed certificates, those certificates are valid for a lab environment

Generate Store JKS

11. Generate a key

sudo openssl genrsa -aes256 -out soffid.pam.store.key

2.

2Generate the .pem file

sudo openssl req -x509 -days 1000 -new -key soffid.pam.store.key -out soffid.pam.store.pem

3To bear in mind the CN (Common Name) when creating the certificate

3. Generate the .pfx file

sudo openssl pkcs12 -export -in soffid.pam.store.pem -inkey soffid.pam.store.key -out soffid.pam.store.pfx

4.

4Generate the .jks file

sudo keytool -v -importkeystore -srckeystore soffid.pam.store.pfx -srcstoretype PKCS12 \
  -destkeystore soffid.pam.store.jks \
  -deststoretype JKS \
  -destkeypass 123456 -srcstorepass 123456 -deststorepass 123456

Generate Launcher JKS

11. Generate a key

sudo openssl genrsa -aes256 -out soffid.pam.launcher.key

2.

2Generate the .pem file

sudo openssl req -x509 -days 1000 -new -key soffid.pam.launcher.key -out soffid.pam.launcher.pem

3

To bear in mind the CN (Common Name) when creating the certificate

3. Generate the .pfx file

sudo openssl pkcs12 -export -in soffid.pam.launcher.pem -inkey soffid.pam.launcher.key -out soffid.pam.launcher.pfx

4.

4Generate the .jks file

sudo keytool -v -importkeystore -srckeystore soffid.pam.launcher.pfx -srcstoretype PKCS12 \
  -destkeystore soffid.pam.launcher.jks \
  -deststoretype JKS \
  -destkeypass 123456 -srcstorepass 123456 -deststorepass 123456