Define a keystore for software encryption using the iKeyman utility
These steps define and open a keystore for software encryption using the iKeyman utility.
Use this procedure to open the cryptographic key database.
- Invoke the iKeyman facility by issuing the following command.
The iKeyman facility is a graphical user interface, so an X11 or VNC
graphical environment must already be active before running iKeyman.
java com.ibm.gsk.ikeyman.Ikeyman - Create a Java™ key database
if one does not already exist:
- Click .
- In the New window, complete these fields:
- Key database type - Accept the default of jks.
- File name - Type the file name. An example is testkeys.jks.
- Location - Enter a directory into which the JKS keystore is placed.
- Click OK.
- At the password prompt:
- Type a password.
- Choose a password expiration date.
- Record the password for future use when opening the keystore.
- Click OK.
- If a Java key database already
exists:
- Open the testkeys.jks keystore database with Key Database Type: JKS.
- Enter a password for the software keystore database that to later be used for software encryption testing.
For JSSE testing, keystore file testkeys.jks was in the /home/jsse directory.
- Create a self-signed certificate. This task is done on both JSSE
client and server.
- Select .
- Select New self signed.
- Enter a key label. The name does not matter, but it should be unique.
- Accept all defaults.
- Click OK.
- To export, click Extract certificate, which creases a .cert file to import a certificate. Do this step on both JSSE client and server.
- Transfer the .cert file to the local file system of each other system used in the study.
- Select Signer certificates in the pull down menu under the label Keystore content.
- Click Add.
- Type the path of the .cert file.
- Click Open.
- Click OK.
- Type a label. The name does not matter as long there is only one, so use the same name as on the original keystore.
- Click OK.
- Add (import) the certificate after extracting it to a cert.arm file
on the other systems that are to do SSL handshakes with this system.
When reviewing the signer certificates, you must see a signed certificate from the other system as well as the signed certificates generated locally on this system.
It is advisable to use meaningful names, such as: certClient.arm and certServer.arm instead of the default name cert.arm. An alternative is to use host names in the file names, to indicate which certificate came from which system.