This section discusses the process to generate a keystore file, use it to create a Certificate Signing Request (CSR) for third party CA authorities, import the signed certificates back into the keystore, and use it in Fiorano to create secure RESTful or Web services.

Generating a Keystore

  1. Open command prompt and navigate to %JDK_HOME%/bin directory.

    Icon

    JDK8 is used in this exercise.

  2. Enter the following command, and then press Enter.

    Icon

    Use any name for keystore and alias, but they should be carefully used in the subsequent commands.

  3. Enter a password for thekeystore. The password used in this example is'fioranopass'.
  4. Answer all the Organization details. When prompted for the First Name and Last Name, enter the fully qualified domain name (FQDN), Host Name or URL of the organization for which the certificate is applied for.
  5. For requesting a Wildcard certificate, please add an asterisk * on the left side of the Common Name.
    Example: .mydomain.com or www.mydomain.com. This secures all subdomains of the Common Name.

    Icon

    All the details provided in this step must be valid. If any of these values are invalid, CA authorities reject the CSR. In this example, fiorano.com is used as the First and Last name, as this certificate is generated to secure RESTful/webservices in fiorano.com.


Generating a Certificate Signing Request (CSR)

A CSR needs to be generated using the keystore created in the previous section. CSR is used by the CA authorities. Whenever a keystore is changed or updated, a new CSR needs to be generated.

  1. To Generate a CSR, enter the following command, and then press Enter:

  2. Provide keystore password provided in the Generating a Keystore section above ("fioranopass" is used in our example).

  3. A file named "fiorano.csr" is created which contains the certificate signing request (CSR). This CSR has to be passed on to the external/third party CA (Certificate Authority).

The CA will authenticate the certificate requestor (usually off-line) and will return a certificate or certificate chain used to replace the existing certificate chain (which initially consists of a self-signed certificate) in the keystore.

Generating SSL certificate using CSR

A third-party CA website needs to be approached to request an SSL certificate using the CSR generated in the Generating a Certificate Signing Request (CSR) section. Third party CA websites such as http://www.thawte.com/ and https://www.godaddy.com can be used to generate SSL certificates. In this example, a 21-day trial certificate of Thawte.com is generated and used but the trial certificate is not recommended for any usage.


To copy the CSR,

  1. Open the fiorano.csr file generated in the Generating a Certificate Signing Request (CSR) section.
  2. Highlight the area from ----BEGIN CERTIFICATE REQUEST to END CERTIFICATE REQUEST---- and press Enter.
  3. Paste it in CA website online application to generate SSL certificates.

Using certificates from a CA authority

CA authorities will sybsequently send a signed certificate, intermediate certificate and root certificate. Import all these certificates into the fiorano.jks keystore file.

Icon
  • The intermediate and root certificate should have different alias names, but the primary signed certificate should be imported with the same alias that was used while creating a certificate pair in the Generating a Keystore section.
  • Download certificate files from the certificate authority and save them to the same directory as the keystore created during the CSR creation process. 

The certificate will only work with the same keystore that you initially created the CSR with. The certificates must be installed to your keystore in the correct order.

Assuming sslcert.pem, intermediate.pem and root.pem are the certificates received from CA authorities, following commands are used to import all the certificates into the keystore.

Command 1

Command 2

Command 3

All the certificates are added to the keystore and it is ready to use.

When root and intermediate certificates are added to the keystore, a message: "Certificate was added to keystore" is displayed. When primary certificate is added to the keystore, the message displayed is "Certificate reply was installed in keystore".

If there is no errors in this process, move to the Using the keystore in Fiorano section.

Listing keystore entries

To list the keystore and check if all the certificates are imported successfully, use the following command:


To dispolay the certificate chain length for fiorano alias, specify the -v option in the above command.

 

Adaptavist ThemeBuilder EngineAtlassian Confluence