× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Mike, we had an internal e-mail that dealt with a customer who had a
certificate in IIS which they had to export to have Tomcat recognize it.
These are the instructions which may or may not help but perhaps give you a
clue:

Export the certificate from IIS as follows:

Start Internet Services Manager on your 2000 Server
Open the default web site properties (or a virtual directory?s properties,
if the certificate is associated with that)
Click the Directory Security tab
Click ?View Certificate?
Click the Details tab
Click ?Copy to File?
In the wizard, choose ?Yes, export the private key?
Choose PKCS #12 format without the strong protection (an IIS thing only)
Assign a private key password (example: secret1)
Pick a destination file ? like \win2k\mycert.pfx

A keystore file must already exist in order to move the certificate in the
pfx file to the Java keystore file.  If you don?t already have one, here?s
how you can create a keystore file:

cd \j2sdk1.4.2\bin
keytool ?genkey ?alias junk ?keyalg RSA ?keystore \tomcat\keystore
Example of a password to assign when prompted: secret2

Here?s how to copy the pfx file to the keystore file:

Copy the attached files to \j2sdk1.4.2\bin
cd \j2sdk1.4.2\bin
java keymove pkcs12 \win2k\mycert.pfx secret1 jks \tomcat\keystore secret2

If you created a ?junk? key pair just to build the keystore file, you can
get rid of it by doing the following:

cd \j2sdk1.4.2\bin
keytool ?delete ?alias junk ?keystore \tomcat\keystore


Once that is done, the \tomcat\keystore file can be referenced in Tomcat?s
server.xml configuration in the 8443 connector?s XML tag/attributes.  An
example of that is:

    <!-- Define a SSL Coyote HTTP/1.1 Connector on port 8443 -->

    <Connector className="org.apache.coyote.tomcat4.CoyoteConnector"
              port="8443" minProcessors="5" maxProcessors="75"
              enableLookups="true"
              acceptCount="100" debug="0" scheme="https" secure="true"
              useURIValidationHack="false" disableUploadTimeout="true">
      <Factory
className="org.apache.coyote.tomcat4.CoyoteServerSocketFactory"
               clientAuth="false" protocol="TLS"
               keystoreFile="c:\Tomcat\keystore"
               keystorePass="secret2"/>
    </Connector>


Not sure what server you are running but this might get the "creative
juices" flowing.

Pete Helgren
Timp Tech/Ed Tech Labs



> -----Original Message-----
> From: midrange-l-bounces@xxxxxxxxxxxx
> [mailto:midrange-l-bounces@xxxxxxxxxxxx]On Behalf Of Wills, Mike N. (TC)
> Sent: Tuesday, November 11, 2003 10:49 AM
> To: Midrange Systems Technical Discussion
> Subject: Certificate is not signed by a trusted certificate authority -
> java error
>
>
> I am posting it here to hopefully get a quicker response. I have received
> none so far from either java list.
>
> I am trying to connect to an internal SSL site with java and keep
> on getting
> this error:
> com.taylor.docgate.DocgateException: DocgateDAOAImpl.Login.IOException:
> javax.net.ssl.SSLHandshakeException: Certificate is not signed by
> a trusted
> certificate authority.
>
> How do get java to accept our SSL site as a trusted site? We do
> have a "root
> certificate" for the company.
>
> What we are beginning to think is that java is either not using the right
> cacerts file or it doesn't like the new entry in the file. Can
> anyone at all
> help me out?
>
> Mike Wills
> Lawson Programmer/Administrator
> Taylor Corporation
> Email: mnwills AT taylorcorpNOSPAM DOT com
> AIM: iSeriesCodePoet
> _______________________________________________
> This is the Midrange Systems Technical Discussion (MIDRANGE-L)
> mailing list
> To post a message email: MIDRANGE-L@xxxxxxxxxxxx
> To subscribe, unsubscribe, or change list options,
> visit: http://lists.midrange.com/mailman/listinfo/midrange-l
> or email: MIDRANGE-L-request@xxxxxxxxxxxx
> Before posting, please take a moment to review the archives
> at http://archive.midrange.com/midrange-l.
>


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.