By default, the keytool utility creates a keystorefile in the directory where the utility is run.
To run the keytool utility, your shell environmentmust be configured so that the J2SE /bin directory is inthe path, otherwise the full path to the utility must be present on the commandline.
On some platforms, OpenSSL will save the.key file to the same directory from where the –req command was run. If you have yet to install the certificate and cannot find the key, it’s possible it’s gone. If you created the CSR but cannot locate your key file, the easiest thing to do is reissue your certificate. Howto convert a PFX to a seperate.key/.crt file. In this article I’m going to show you the commands you need to convert your.PFX Certificate file to a seperate certificate and keyfile. This article can come in handy when you need to import your certificates on devices like Cisco routers/loadbalancers etc. Where you probably need to.
Change to the directory that contains the keystore and truststorefiles.
Always generate the certificate in the directory containingthe keystore and truststore files. The default is domain-dir/config.
Generate the certificate in the keystore file, keystore.jks,using the following command format:
Use any unique name as your keyAlias. Ifyou have changed the keystore or private key password from the default (changeit), substitute the new password for changeit.The default key password alias is s1as.
A prompt appears that asks for your name, organization, and other information.
Export the generated certificate to the server.cer file(or client.cer if you prefer), using the following commandformat:
If a certificate signed by a certificate authority is required,see To Sign a Certificate by Using keytool.
Create the cacerts.jks truststore file andadd the certificate to the truststore, using the following command format:
If you have changed the keystore or private key password from the default(changeit), substitute the new password.
Information about the certificate is displayed and a prompt appearsasking if you want to trust the certificate.
Type yes, then press Enter.
Informationsimilar to the following is displayed:
To apply your changes, restart GlassFish Server. See To Restart a Domain.
RSA is public-key encryption technology developed by RSA Data Security,Inc.
For more information about keytool, see the keytool reference page.
You can also use Microsoft IIS to generate a Private Key and CSR.
1. Click Start, then Administrative Tools, then Internet Information Services (IIS) Manager.
2. Click on the server name.
3. From the center menu, double-click the 'Server Certificates' button in the 'Security' section (it is near the bottom of the menu).
4. Next, from the 'Actions' menu (on the right), click on 'Create Certificate Request.' This will open the Request Certificate wizard.
5. In the 'Distinguished Name Properties' window, enter the information as follows:
6. Click Next.
7. In the 'Cryptographic Service Provider Properties' window, leave both settings at their defaults (Microsoft RSA SChannel and 2048) and then click next./call-of-duty-2-pc-cd-key-generator.html.
8. Enter a filename for your CSR file.
9. Remember the filename that you choose and the location to which you save it. You will need to open this file as a text file and copy the entire body of it (including the Begin and End Certificate Request tags) into the online order process when prompted
To backup a private key on Microsoft IIS 6.0 follow these instructions:
1. From your server, go to Start > Run and enter mmc in the text box. Click on the OK button.
2. From the Microsoft Management Console (MMC) menu bar, select Console > Add/Remove Snap-in.
3. Click on the Add button. Select Certificates from the list of snap-ins and then click on the Add button.
4. Select the Computer account option. Click on the Next button.
5. Select the Local computer (the computer this console is running on) option. Click on the Finish button.
6. Click on the Close button on the snap-in list window. Click on the OK button on the Add/Remove Snap-in window.
7. Click on Certificates from the left pane. Look for a folder called REQUEST or 'Certificate Enrollment Request> Certificates
8. Select the private key that you wish to backup. Right click on the file and choose > All Tasks > Export
9. The certificate export wizard will start, please click Next to continue. In the next window select Yes, export the private key and click Next
10. Leave the default settings selected and click Next.
11. Set a password on the private key backup file and click Next
12. Click on Browse and select a location where you want to save the private key Backup file to and then click Next to continue. By default the file will be saved with a .pfx extension.
13. Click Finish, to complete the export process
The private key is backed up as a ‘.pfx’ file, which stands for Personal Information Exchange.
To convert it to RSA Private Key format supported by inSync:
1. Download and install latest version of OpenSSL for windows from http://www.slproweb.com/products/Win32OpenSSL.html.
Note: OpenSSL requires Visual C++ 2008 Redistributables which can be downloaded from the same website.
2. Open command prompt, navigate to C:OpenSSL-Win32bin>, and run the following commands.
3. The private key will be saved as ‘myserver.key’.
4. Carefully protect the private key. Be sure to backup the private key, as there is no means to recover it, should it be lost.