1. Generate JKS files
In this case I use self-signed certificates, these certificates are valid for a laboratory environment.
1.1. Generate Store JKS
1.a. Generate a key
sudo openssl genrsa -aes256 -out soffid.pam.store.key
2.b. Generate the .pem file
sudo openssl req -x509 -days 1000 -new -key soffid.pam.store.key -out soffid.pam.store.pem
To bear in mind the CN (Common Name) when creating the certificate
3.c. Generate the .pfx file
sudo openssl pkcs12 -export -in soffid.pam.store.pem -inkey soffid.pam.store.key -out soffid.pam.store.pfx
4.d. Generate the .jks file
sudo keytool -v -importkeystore -srckeystore soffid.pam.store.pfx -srcstoretype PKCS12 \
-destkeystore soffid.pam.store.jks \
-deststoretype JKS \
-destkeypass 123456 -srcstorepass 123456 -deststorepass 123456
1.2. Generate Launcher JKS
1.a. Generate a key
sudo openssl genrsa -aes256 -out soffid.pam.launcher.key
2.b. Generate the .pem file
sudo openssl req -x509 -days 1000 -new -key soffid.pam.launcher.key -out soffid.pam.launcher.pem
To bear in mind the CN (Common Name) when creating the certificate
3.c. Generate the .pfx file
sudo openssl pkcs12 -export -in soffid.pam.launcher.pem -inkey soffid.pam.launcher.key -out soffid.pam.launcher.pfx
4.d. Generate the .jks file
sudo keytool -v -importkeystore -srckeystore soffid.pam.launcher.pfx -srcstoretype PKCS12 \
-destkeystore soffid.pam.launcher.jks \
-deststoretype JKS \
-destkeypass 123456 -srcstorepass 123456 -deststorepass 123456