You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: its/it-tests/src/test/resources/SSLTest/README.md
+27-8Lines changed: 27 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -286,14 +286,14 @@ The `server.p12` file can now be used to start a TLS server.
286
286
287
287
#### Now let's a client to connect to our TLS server
288
288
289
-
Since we've created a selfsigned certificate. The client must either have our certificate (without the private key) or must have the CA certificate.
289
+
Since we've created a self-signed certificate. The client must either have our certificate (without the private key) or must have the CA certificate.
290
290
291
-
##### Let's create a JKS with the server certificate
291
+
##### Let's create a PKCS12 keystore with the server certificate
292
292
293
-
This one is more easier :
293
+
Keytool is adding extra fields to the keystore, that are not supported by older versions of openssl. Waiting for openssl 3.3.0+ and the possibility to use the `-jdktrust anyExtendedKeyUsage` option, we have to use keytool to create the keystore.
@@ -413,7 +432,7 @@ This will go to client keyStore.
413
432
Now we'll generate the `server-with-client-ca.p12` file that will have the CA certificate. Since we don't need to add the key of the certificate (only required to sign, not to verify), we can import it directly with keytool.
0 commit comments