[UNIX, Linux, Windows]

Receiving personal certificates into a key repository on UNIX, Linux, and Windows

Use this procedure to receive a personal certificate into the key database file. The key repository must be the same repository where you created the certificate request.

After the CA sends you a new personal certificate, you add it to the key database file from which you generated the new certificate request . If the CA sends the certificate as part of an email message, copy the certificate into a separate file.

Using strmqikm

If you need to manage TLS certificates in a way that is FIPS compliant, use the runmqakm command. strmqikm does not provide a FIPS-compliant option.

Ensure that the certificate file to be imported has write permission for the current user, and then use the following procedure for either a queue manager or an IBM® MQ MQI client to receive a personal certificate into the key database file:

  1. Start the GUI using the strmqikm command (on Windows UNIX and Linux® ).
  2. From the Key Database File menu, click Open. The Open window opens.
  3. Click Key database type and select CMS (Certificate Management System).
  4. Click Browse to navigate to the directory that contains the key database files.
  5. Select the key database file to which you want to add the certificate, for example key.kdb.
  6. Click Open, and then click OK. The Password Prompt window opens.
  7. Type the password you set when you created the key database and click OK. The name of your key database file is displayed in the File Name field. Select the Personal Certificates view.
  8. Click Receive. The Receive Certificate from a File window opens.
  9. Type the certificate file name and location for the new personal certificate, or click Browse to select the name and location.
  10. Click OK. If you already have a personal certificate in your key database, a window opens, asking if you want to set the key you are adding as the default key in the database.
  11. Click Yes or No. The Enter a Label window opens.
  12. Click OK. The Personal Certificates field shows the label of the new personal certificate you added.

Using the command line

To add a personal certificate to a key database file, use either of the following commands:
  • Using runmqckm:
    runmqckm -cert -receive -file filename -db filename -pw password
             -format ascii
  • Using runmqakm:
    runmqakm -cert -receive -file filename -db filename -pw password -fips
-file filename
Specifies the fully qualified file name of the personal certificate.
-db filename
Specifies the fully qualified file name of a CMS key database.
-pw password
Specifies the password for the CMS key database.
-format ascii
Specifies the format of the certificate. The value can be ascii for Base64-encoded ASCII or binary for Binary DER data. The default is ascii.
Specifies that the command is run in FIPS mode. When in FIPS mode, the ICC component uses algorithms that have been FIPS 140-2 validated. If the ICC component does not initialize in FIPS mode, the runmqakm command fails.

If you are using cryptographic hardware, refer to Receiving a personal certificate into your PKCS #11 hardware.