Page History
...
Note here that the value of the -name
field is "shrine.example.edu-https". The reason is that we will eventually be importing this entire entry back into the main Java keystore where another entry called shrine.example.edu
already exists. Recalling our earlier discussion about the purposes of certificates, we see that shrine.example.edu
entry is responsible for application message signing, and shrine.example.edu-https
entry is responsible for web browser encryption. Therefore two distinct entry names are necessary.
LOREM IPSUM
Once you have the PKCS12 package, you'll now need to import this into your existing shrine.keystore:.
Code Block | ||||
---|---|---|---|---|
| ||||
$ keytool -importkeystore -srckeystore shrine.keystore.p12.temp -srcstoretype pkcs12 -srcstorepass <your_pkcs12_file_password> -deststorepass xxxxxxsrcalias shrine.example.edu-https -destkeystore shrine.keystore -srckeystoredeststoretype chain.pfxjks -srcstoretype PKCS12deststorepass <your_destination_keystore_password> -aliasdestalias acttestshrine.harvardshrineexample.netedu-https |
Once imported in, your shrine.keystore should look like this:
...
Overview
Content Tools