Leave a Comment:
12 comments
hi Atul,
How can i export privatekey from certificate as .pem or .prv format ?
Reply[…] You must also import CA’s certificate (Certifying Authority) that issued certificate to your LDAP Server (OID/OVD) into trust store of WebLogic Server. To more about SSL and steps to import CA’s certificate in WebLogic’s Trust Store click here and here […]
ReplyIn my implementation, I need to import two certificates and two aliases. I can solve half the problem that is, I can import two certificates in my keystore file with 2 different aliases. But the SSL tab on Weblogic console can hold only one alias. How do solve this problem ?
Thanks in advance,
Nalini
@Nalini,
Why two certificates ? Are you counting trust certificates too ? All you need to look for is identity certificate that should be name of the server/url that you are trying to access . You don’t import two certificates for one WebLogic Server .
If you have some other reason for two certs then explain here please .
Reply@Atul thanks for the quick response.
I need to post to two different websites each have their own SSL certificates. In my keystore file I have the following aliases:
– mykey1 for website 1
– mykey2 for website 2
On the Weblogic console of the managed server, I have configured SSL tab to use the alias, mykey1. How can I add ‘mykey2’ for website 2 on the same same managed server?
Thanks again !
Reply@ Nalini,
You must be using WebServer or load balancer in front of weblogic so there you put different certificates (under virtualHost if Apache or OHS). On weblogic you use single certificate only .
Unless someone says you can use two certs for single WebLogic Server – Curious to know if this is even supported by WebLogic Server
ReplyHi Atul,
We have a case where there is 8 different WL servers running in 8 different nodes. Each have separate wl domain. Our web Domain is, say: *.example.com.
Is there a way i can request for a single CSR for *.example.com and after getting the identity trust i can use it with these 8 different wl servers with url such as m1.example.com,m2.exmaple.com … m8.example.com?
that means is it possible while generating csr i use for exmaple:-
-dname “CN=*.exmple.com, OU=WL, O=Admin, ST=Bangalore,C=IN”
Then then import the certs to these 8 different WL domains separately following the above method??
ReplyHi Atul, thanks a lot for providing this document. It’s very useful. But i have a different scenario – i need to configure “custom identity and java standard trust” so can you guide me on this. How to proceed???? By using keytool i generated jks(as per the step 1) and also csr as per the step2. As you said after that some CA has to authorize here – it means what? To whom i need to send this ?? Is there any other way to create own certificate authority ???? if yes requesting you to provide me the steps and then what all additional steps i need to follow in case of custom identity and java standard trust.
Hope to see your reply soon.
Regards,
Raghav
Hello Atul,
I have received 4 files from CA after sending CSR below mentioned,
1.ChainCertificate.p7b
2.RootChainCertificate.p7b
3.SignedCertificate.cer
4.RootSignedCertificate.cer
In that 4 files Im getting confusion, that which files need to import in which command that you’ve mentioned above?
Can you please guide me how to import and configure all the above mentioned files? I’ll be very great-full to you.
Thank you.
Best Regards,
Sharath
Hello Atul,
I have created the JavaKeyStore file(.jks) as you mentioned above. Also I have genereted CSR from that KeyStore and sent to CA for signing. After that I have received 4 certificates from CA, mentioned below,
1.ChainCertificate.p7b
2.SignedCertificate.cer
3.RootChainCertificate.p7b
4RootSignedCertificate.cer
Could you please help me to import the above certificates. I’m getting confusion what are all those files and and which command should i use for importing. Please help me!
Thank you.
Regards,
Sharath
Hi Atul,
I was trying to import Root CA cert and I am getting the following promt –
Certificate already exists in system-wide CA keystore under alias
Is it fine if I move forward saying Yes as fingerprints of both the certs are different?
Or what else can be done?