The commandLine utility that is discussed
in this topic, extracts the private and public keys from the secure
and public ring files, from the PGP/GPG keystore.
Procedure
To extract the keys from the PGP/GPG keystore, the commandLine utility
uses the following parameters:
- commandLine utility accepts the following
parameters to extract the private and public keys:
extractPKCS12AndPublicKey.bat -privateKeyRingFile <file name of the secret key ring file> -publicKeyRingFileName <file name of the pub key ring file> -passphrase <password for the gpg keys> -keyStoreLocation <keyStore Location> -keyStorePassword <keystore password> -privateCertificateName <private certificate name> -issuerName <name of the certificate issuer> -certificateStartDate <start date> -certificateExpiryDate <end date> -algorithmName SHA256withRSA
For
example:
extractPKCS12AndPublicKey.bat -privateKeyRingFile C:\Users\IBM_ADMIN\Documents\gpg\secring.gpg -publicKeyRingFile C:\Users\IBM_ADMIN\Documents\gpg\pubring.gpg -passphrase appconnect -keyStoreLocation C:\mykeystore.p12 -keyStorePassword changeit -privateCertificateName myKey -issuerName "C=US, ST=CA, L=Mountain View, O=App Connect Systems, CN=Integration Appliance VMWSULXJE23SK6HO" -certificateStartDate 01-01-2013 -certificateExpiryDate 01-01-2015 -algorithm SHA256withRSA
- commandLine utility accepts the following
parameters to import the private and public keys to a Studio keystore
file:
importPKCS12IntoJKS.bat -privateCertificateName <private certificate name> -pkcsKeyStoreLocation < PKCS12 keystore store that we created in step1 > -pkcsKeyStorePassword < password for the keystore>
For
example:
importPKCS12IntoJKS.bat -privateCertificateName myKey -pkcsKeyStoreLocation C:mykeystore.p12 -pkcsKeyStorePassword changeit
Note: Step 2 is not required for the appliance. You can import the generated PKCS12
keystore to the appliance through the Security menu on the Web Management
Console dashboard. For more information about importing certificates, see Web Management Console
documentation.