Pulling a CA-signed certificate into a keystore
You can add a CA-signed TLS certificate to a keystore by running the gsk8capicmd_64 command, using IBM Global Security Kit (GSKit).
About this task
By including the -cert -receive option, you tell IBM Global Security Kit (GSKit) to receive the signed
certificate signing request (CSR) and associate it with the corresponding private key in the
keystore.
Important: When you receive your signed CSR from your CA or Security team, DO
NOT use the -add option in your gsk8capicmd_64 command. Using
this option does not associate the certificate with the private key in your keystore, and leaves the
certificate unusable for TLS.
Procedure
Using IBM Global Security Kit (GSKit), run the following command to pull your CA-signed certificate into your
keystore:
gsk8capicmd_64 -cert -receive -db server.p12 -stashed -file myselfsigned.cer
Note: If the signed certificate is received before the root certificate and any intermediate
certificates are added, gsk8capicmd_64 might return a following CTGSK2146W
warning:
CTGSK2146W An invalid certificate chain was found.
Additional untranslated info:
GSKKM_LAST_VALIDATION_ERROR: No certificate chain built
This message is a warning
indicating the root and intermediate certificates were not found, however the certificate was still
successfully received. The root and intermediate certificates must be added to the keystore before
the signed certificate can be used for TLS.