jdk/src/linux/doc/man/keytool.1
author jjg
Tue, 11 Mar 2008 13:14:55 -0700
changeset 168 25697c18650b
parent 2 90ce3da70b43
child 2692 345bc8d65b19
permissions -rw-r--r--
6307187: clean up code for -Xlint:options Summary: introduce common code for handling one-of and any-of options Reviewed-by: mcimadamore
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     1
.'" t
90ce3da70b43 Initial load
duke
parents:
diff changeset
     2
."
90ce3da70b43 Initial load
duke
parents:
diff changeset
     3
." Copyright 2000-2006 Sun Microsystems, Inc.  All Rights Reserved.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     4
." DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     5
."
90ce3da70b43 Initial load
duke
parents:
diff changeset
     6
." This code is free software; you can redistribute it and/or modify it
90ce3da70b43 Initial load
duke
parents:
diff changeset
     7
." under the terms of the GNU General Public License version 2 only, as
90ce3da70b43 Initial load
duke
parents:
diff changeset
     8
." published by the Free Software Foundation.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     9
."
90ce3da70b43 Initial load
duke
parents:
diff changeset
    10
." This code is distributed in the hope that it will be useful, but WITHOUT
90ce3da70b43 Initial load
duke
parents:
diff changeset
    11
." ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    12
." FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
90ce3da70b43 Initial load
duke
parents:
diff changeset
    13
." version 2 for more details (a copy is included in the LICENSE file that
90ce3da70b43 Initial load
duke
parents:
diff changeset
    14
." accompanied this code).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    15
."
90ce3da70b43 Initial load
duke
parents:
diff changeset
    16
." You should have received a copy of the GNU General Public License version
90ce3da70b43 Initial load
duke
parents:
diff changeset
    17
." 2 along with this work; if not, write to the Free Software Foundation,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    18
." Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    19
."
90ce3da70b43 Initial load
duke
parents:
diff changeset
    20
." Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    21
." CA 95054 USA or visit www.sun.com if you need additional information or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    22
." have any questions.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    23
." 
90ce3da70b43 Initial load
duke
parents:
diff changeset
    24
." `
90ce3da70b43 Initial load
duke
parents:
diff changeset
    25
.TH keytool 1 "07 Aug 2006"
90ce3da70b43 Initial load
duke
parents:
diff changeset
    26
." Generated by html2man
90ce3da70b43 Initial load
duke
parents:
diff changeset
    27
90ce3da70b43 Initial load
duke
parents:
diff changeset
    28
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    29
.SH NAME
90ce3da70b43 Initial load
duke
parents:
diff changeset
    30
keytool \- Key and Certificate Management Tool
90ce3da70b43 Initial load
duke
parents:
diff changeset
    31
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    32
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
    33
90ce3da70b43 Initial load
duke
parents:
diff changeset
    34
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    35
Manages a keystore (database) of cryptographic keys, X.509 certificate chains, and trusted certificates.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    36
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
    37
.SH "SYNOPSIS"
90ce3da70b43 Initial load
duke
parents:
diff changeset
    38
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    39
90ce3da70b43 Initial load
duke
parents:
diff changeset
    40
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    41
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
    42
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
    43
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
    44
\fP\f3keytool\fP [ commands ]
90ce3da70b43 Initial load
duke
parents:
diff changeset
    45
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
    46
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
    47
90ce3da70b43 Initial load
duke
parents:
diff changeset
    48
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    49
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    50
The keytool command interface has changed in Java SE 6. See the Changes Section for a detailed description. Note that previously defined commands are still supported.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    51
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    52
.SH "DESCRIPTION"
90ce3da70b43 Initial load
duke
parents:
diff changeset
    53
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    54
90ce3da70b43 Initial load
duke
parents:
diff changeset
    55
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    56
\f3keytool\fP is a key and certificate management utility. It allows users to administer their own public/private key pairs and associated certificates for use in self\-authentication (where the user authenticates himself/herself to other users/services) or data integrity and authentication services, using digital signatures. It also allows users to cache the public keys (in the form of certificates) of their communicating peers. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
    57
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    58
A \f2certificate\fP is a digitally signed statement from one entity (person, company, etc.), saying that the public key (and some other information) of some other entity has a particular value. (See Certificates.) When data is digitally signed, the signature can be verified to check the data integrity and authenticity. \f2Integrity\fP means that the data has not been modified or tampered with, and \f2authenticity\fP means the data indeed comes from whoever claims to have created and signed it.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    59
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    60
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    61
\f3keytool\fP also enables users to administer secret keys used in symmetric encryption/decryption (e.g. DES).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    62
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    63
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    64
\f3keytool\fP stores the keys and certificates in a \f2keystore\fP. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
    65
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    66
.SH "COMMAND AND OPTION NOTES"
90ce3da70b43 Initial load
duke
parents:
diff changeset
    67
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    68
90ce3da70b43 Initial load
duke
parents:
diff changeset
    69
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    70
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    71
The various commands and their options are listed and described below . Note:
90ce3da70b43 Initial load
duke
parents:
diff changeset
    72
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    73
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
    74
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    75
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
    76
All command and option names are preceded by a minus sign (\-). 
90ce3da70b43 Initial load
duke
parents:
diff changeset
    77
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    78
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
    79
The options for each command may be provided in any order. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
    80
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    81
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
    82
All items not italicized or in braces or square brackets are required to appear as is. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
    83
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    84
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
    85
Braces surrounding an option generally signify that a default value will be used if the option is not specified on the command line. Braces are also used around the \f2\-v\fP, \f2\-rfc\fP, and \f2\-J\fP options, which only have meaning if they appear on the command line (that is, they don't have any "default" values other than not existing). 
90ce3da70b43 Initial load
duke
parents:
diff changeset
    86
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    87
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
    88
Brackets surrounding an option signify that the user is prompted for the value(s) if the option is not specified on the command line. (For a \f2\-keypass\fP option, if you do not specify the option on the command line, \f3keytool\fP will first attempt to use the keystore password to recover the private/secret key, and if this fails, will then prompt you for the private/secret key password.) 
90ce3da70b43 Initial load
duke
parents:
diff changeset
    89
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    90
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
    91
Items in italics (option values) represent the actual values that must be supplied. For example, here is the format of the \f2\-printcert\fP command: 
90ce3da70b43 Initial load
duke
parents:
diff changeset
    92
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
    93
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
    94
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
    95
  keytool \-printcert {\-file \fP\f4cert_file\fP\f3} {\-v}
90ce3da70b43 Initial load
duke
parents:
diff changeset
    96
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
    97
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    98
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
    99
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   100
When specifying a \f2\-printcert\fP command, replace \f2cert_file\fP with the actual file name, as in: 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   101
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   102
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   103
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   104
  keytool \-printcert \-file VScert.cer
90ce3da70b43 Initial load
duke
parents:
diff changeset
   105
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   106
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   107
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   108
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   109
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   110
Option values must be quoted if they contain a blank (space). 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   111
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   112
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   113
The \f2\-help\fP command is the default. Thus, the command line 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   114
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   115
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   116
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   117
  keytool
90ce3da70b43 Initial load
duke
parents:
diff changeset
   118
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   119
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   120
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   121
is equivalent to 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   122
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   123
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   124
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   125
  keytool \-help
90ce3da70b43 Initial load
duke
parents:
diff changeset
   126
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   127
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   128
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   129
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   130
90ce3da70b43 Initial load
duke
parents:
diff changeset
   131
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   132
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   133
Option Defaults
90ce3da70b43 Initial load
duke
parents:
diff changeset
   134
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   135
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   136
90ce3da70b43 Initial load
duke
parents:
diff changeset
   137
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   138
Below are the defaults for various option values. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   139
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   140
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   141
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   142
\-alias "mykey"
90ce3da70b43 Initial load
duke
parents:
diff changeset
   143
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   144
90ce3da70b43 Initial load
duke
parents:
diff changeset
   145
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   146
\-keyalg
90ce3da70b43 Initial load
duke
parents:
diff changeset
   147
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   148
    "DSA" (when using \fP\f3\-genkeypair\fP\f3)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   149
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   150
    "DES" (when using \fP\f3\-genseckey\fP\f3)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   151
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   152
90ce3da70b43 Initial load
duke
parents:
diff changeset
   153
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   154
\-keysize
90ce3da70b43 Initial load
duke
parents:
diff changeset
   155
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   156
    1024 (when using \fP\f3\-genkeypair\fP\f3)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   157
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   158
    56 (when using \fP\f3\-genseckey\fP\f3 and \-keyalg is "DES")
90ce3da70b43 Initial load
duke
parents:
diff changeset
   159
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   160
    168 (when using \fP\f3\-genseckey\fP\f3 and \-keyalg is "DESede")
90ce3da70b43 Initial load
duke
parents:
diff changeset
   161
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   162
90ce3da70b43 Initial load
duke
parents:
diff changeset
   163
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   164
\-validity 90
90ce3da70b43 Initial load
duke
parents:
diff changeset
   165
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   166
90ce3da70b43 Initial load
duke
parents:
diff changeset
   167
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   168
\-keystore \fP\f4the file named \fP\f4.keystore\fP\f3 in the user's home directory\fP\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   169
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   170
90ce3da70b43 Initial load
duke
parents:
diff changeset
   171
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   172
\-storetype \fP\f4the value of the "keystore.type" property in the security properties file,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   173
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   174
           which is returned by the static \fP\f4getDefaultType\fP\f3 method in \fP\f4java.security.KeyStore\fP\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   175
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   176
90ce3da70b43 Initial load
duke
parents:
diff changeset
   177
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   178
\-file \fP\f4stdin if reading, stdout if writing\fP\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   179
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   180
90ce3da70b43 Initial load
duke
parents:
diff changeset
   181
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   182
\-protected false
90ce3da70b43 Initial load
duke
parents:
diff changeset
   183
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   184
90ce3da70b43 Initial load
duke
parents:
diff changeset
   185
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   186
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   187
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   188
90ce3da70b43 Initial load
duke
parents:
diff changeset
   189
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   190
In generating a public/private key pair, the signature algorithm (\f2\-sigalg\fP option) is derived from the algorithm of the underlying private key: If the underlying private key is of type "DSA", the \f2\-sigalg\fP option defaults to "SHA1withDSA", and if the underlying private key is of type "RSA", \f2\-sigalg\fP defaults to "MD5withRSA". Please consult the 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   191
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
   192
\f2Java Cryptography Architecture API Specification & Reference\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
   193
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   194
http://java.sun.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html#AppA for a full list of \f2\-keyalg\fP and \f2\-sigalg\fP you can choose from.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   195
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   196
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   197
Common Options
90ce3da70b43 Initial load
duke
parents:
diff changeset
   198
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   199
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   200
90ce3da70b43 Initial load
duke
parents:
diff changeset
   201
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   202
The \f2\-v\fP option can appear for all commands except \f2\-help\fP. If it appears, it signifies "verbose" mode; more information will be output. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   203
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   204
There is also a \f2\-J\fP\f2javaoption\fP option that may appear for any command. If it appears, the specified \f2javaoption\fP string is passed through directly to the Java interpreter. This option should not contain any spaces. It is useful for adjusting the execution environment or memory usage. For a list of possible interpreter options, type \f2java \-h\fP or \f2java \-X\fP at the command line.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   205
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   206
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   207
These options may appear for all commands operating on a keystore:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   208
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   209
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   210
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   211
\-storetype storetype 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   212
This qualifier specifies the type of keystore to be instantiated. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   213
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   214
\-keystore keystore 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   215
The keystore location. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   216
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   217
If the JKS storetype is used and a keystore file does not yet exist, then certain \f3keytool\fP commands may result in a new keystore file being created. For example, if \f2keytool \-genkeypair\fP is invoked and the \f2\-keystore\fP option is not specified, the default keystore file named \f2.keystore\fP in the user's home directory will be created if it does not already exist. Similarly, if the \f2\-keystore \fP\f2ks_file\fP option is specified but \f2ks_file\fP does not exist, then it will be created 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   218
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   219
Note that the input stream from the \f2\-keystore\fP option is passed to the \f2KeyStore.load\fP method. If \f2NONE\fP is specified as the URL, then a null stream is passed to the \f2KeyStore.load\fP method. \f2NONE\fP should be specified if the \f2KeyStore\fP is not file\-based (for example, if it resides on a hardware token device).  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   220
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   221
\-storepass storepass 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   222
The password which is used to protect the integrity of the keystore. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   223
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   224
\f2storepass\fP must be at least 6 characters long. It must be provided to all commands that access the keystore contents. For such commands, if a \f2\-storepass\fP option is not provided at the command line, the user is prompted for it. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   225
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   226
When retrieving information from the keystore, the password is optional; if no password is given, the integrity of the retrieved information cannot be checked and a warning is displayed.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   227
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   228
\-providerName provider_name 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   229
Used to identify a cryptographic service provider's name when listed in the security properties file. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   230
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   231
\-providerClass provider_class_name 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   232
Used to specify the name of cryptographic service provider's master class file when the service provider is not listed in the security properties file. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   233
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   234
\-providerArg provider_arg 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   235
Used in conjunction with \f2\-providerClass\fP. Represents an optional string input argument for the constructor of \f2provider_class_name\fP. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   236
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   237
\-protected 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   238
Either \f2true\fP or \f2false\fP. This value should be specified as \f2true\fP if a password must be given via a protected authentication path such as a dedicated PIN reader. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   239
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   240
90ce3da70b43 Initial load
duke
parents:
diff changeset
   241
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   242
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   243
.SH "COMMANDS"
90ce3da70b43 Initial load
duke
parents:
diff changeset
   244
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   245
90ce3da70b43 Initial load
duke
parents:
diff changeset
   246
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   247
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   248
Creating or Adding Data to the Keystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   249
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   250
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   251
90ce3da70b43 Initial load
duke
parents:
diff changeset
   252
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   253
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   254
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   255
\-genkeypair {\-alias alias} {\-keyalg keyalg} {\-keysize keysize} {\-sigalg sigalg} [\-dname dname] [\-keypass keypass] {\-validity valDays} {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v} {\-protected} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   256
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   257
Generates a key pair (a public key and associated private key). Wraps the public key into an X.509 v3 self\-signed certificate, which is stored as a single\-element certificate chain. This certificate chain and the private key are stored in a new keystore entry identified by \f2alias\fP. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   258
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   259
\f2keyalg\fP specifies the algorithm to be used to generate the key pair, and \f2keysize\fP specifies the size of each key to be generated. \f2sigalg\fP specifies the algorithm that should be used to sign the self\-signed certificate; this algorithm must be compatible with \f2keyalg\fP. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   260
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   261
\f2dname\fP specifies the X.500 Distinguished Name to be associated with \f2alias\fP, and is used as the \f2issuer\fP and \f2subject\fP fields in the self\-signed certificate. If no distinguished name is provided at the command line, the user will be prompted for one. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   262
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   263
\f2keypass\fP is a password used to protect the private key of the generated key pair. If no password is provided, the user is prompted for it. If you press RETURN at the prompt, the key password is set to the same password as that used for the keystore. \f2keypass\fP must be at least 6 characters long. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   264
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   265
\f2valDays\fP tells the number of days for which the certificate should be considered valid. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   266
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   267
This command was named \f2\-genkey\fP in previous releases. This old name is still supported in this release and will be supported in future releases, but for clarify the new name, \f2\-genkeypair\fP, is preferred going forward.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   268
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   269
\-genseckey {\-alias alias} {\-keyalg keyalg} {\-keysize keysize} [\-keypass keypass] {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v} {\-protected} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   270
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   271
Generates a secret key and stores it in a new \f2KeyStore.SecretKeyEntry\fP identified by \f2alias\fP. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   272
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   273
\f2keyalg\fP specifies the algorithm to be used to generate the secret key, and \f2keysize\fP specifies the size of the key to be generated. \f2keypass\fP is a password used to protect the secret key. If no password is provided, the user is prompted for it. If you press RETURN at the prompt, the key password is set to the same password as that used for the keystore. \f2keypass\fP must be at least 6 characters long.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   274
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   275
\-importcert {\-alias alias} {\-file cert_file} [\-keypass keypass] {\-noprompt} {\-trustcacerts} {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerName provider_name} {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v} {\-protected} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   276
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   277
Reads the certificate or certificate chain (where the latter is supplied in a PKCS#7 formatted reply) from the file \f2cert_file\fP, and stores it in the keystore entry identified by \f2alias\fP. If no file is given, the certificate or PKCS#7 reply is read from stdin. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   278
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   279
\f3keytool\fP can import X.509 v1, v2, and v3 certificates, and PKCS#7 formatted certificate chains consisting of certificates of that type. The data to be imported must be provided either in binary encoding format, or in printable encoding format (also known as Base64 encoding) as defined by the Internet RFC 1421 standard. In the latter case, the encoding must be bounded at the beginning by a string that starts with "\-\-\-\-\-BEGIN", and bounded at the end by a string that starts with "\-\-\-\-\-END". 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   280
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   281
You import a certificate for two reasons: 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   282
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   283
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   284
1.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   285
to add it to the list of trusted certificates, or 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   286
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   287
2.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   288
to import a certificate reply received from a CA as the result of submitting a Certificate Signing Request (see the \-certreq command) to that CA. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   289
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   290
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   291
Which type of import is intended is indicated by the value of the \f2\-alias\fP option: 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   292
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   293
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   294
1.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   295
\f3If the alias does not point to a key entry\fP, then \f3keytool\fP assumes you are adding a trusted certificate entry. In this case, the alias should not already exist in the keystore. If the alias does already exist, then \f3keytool\fP outputs an error, since there is already a trusted certificate for that alias, and does not import the certificate. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   296
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   297
2.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   298
\f3If the alias points to a key entry\fP, then \f3keytool\fP assumes you are importing a certificate reply. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   299
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   300
\f3Importing a New Trusted Certificate\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   301
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   302
90ce3da70b43 Initial load
duke
parents:
diff changeset
   303
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   304
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   305
Before adding the certificate to the keystore, \f3keytool\fP tries to verify it by attempting to construct a chain of trust from that certificate to a self\-signed certificate (belonging to a root CA), using trusted certificates that are already available in the keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   306
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   307
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   308
If the \f2\-trustcacerts\fP option has been specified, additional certificates are considered for the chain of trust, namely the certificates in a file named "cacerts".
90ce3da70b43 Initial load
duke
parents:
diff changeset
   309
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   310
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   311
If \f3keytool\fP fails to establish a trust path from the certificate to be imported up to a self\-signed certificate (either from the keystore or the "cacerts" file), the certificate information is printed out, and the user is prompted to verify it, e.g., by comparing the displayed certificate fingerprints with the fingerprints obtained from some other (trusted) source of information, which might be the certificate owner himself/herself. Be very careful to ensure the certificate is valid prior to importing it as a "trusted" certificate! \-\- see WARNING Regarding Importing Trusted Certificates. The user then has the option of aborting the import operation. If the \f2\-noprompt\fP option is given, however, there will be no interaction with the user.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   312
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   313
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   314
\f3Importing a Certificate Reply\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   315
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   316
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   317
When importing a certificate reply, the certificate reply is validated using trusted certificates from the keystore, and optionally using the certificates configured in the "cacerts" keystore file (if the \f2\-trustcacerts\fP option was specified).
90ce3da70b43 Initial load
duke
parents:
diff changeset
   318
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   319
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   320
The methods of determining whether the certificate reply is trusted are described in the following:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   321
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   322
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   323
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   324
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   325
\f3If the reply is a single X.509 certificate\fP, \f3keytool\fP attempts to establish a trust chain, starting at the certificate reply and ending at a self\-signed certificate (belonging to a root CA). The certificate reply and the hierarchy of certificates used to authenticate the certificate reply form the new certificate chain of \f2alias\fP. If a trust chain cannot be established, the certificate reply is not imported. In this case, \f3keytool\fP does not print out the certificate and prompt the user to verify it, because it is very hard (if not impossible) for a user to determine the authenticity of the certificate reply. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   326
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   327
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   328
\f3If the reply is a PKCS#7 formatted certificate chain\fP, the chain is first ordered (with the user certificate first and the self\-signed root CA certificate last), before \f3keytool\fP attempts to match the root CA certificate provided in the reply with any of the trusted certificates in the keystore or the "cacerts" keystore file (if the \f2\-trustcacerts\fP option was specified). If no match can be found, the information of the root CA certificate is printed out, and the user is prompted to verify it, e.g., by comparing the displayed certificate fingerprints with the fingerprints obtained from some other (trusted) source of information, which might be the root CA itself. The user then has the option of aborting the import operation. If the \f2\-noprompt\fP option is given, however, there will be no interaction with the user. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   329
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   330
90ce3da70b43 Initial load
duke
parents:
diff changeset
   331
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   332
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   333
If the public key in the certificate reply matches the user's public key already stored with under \f2alias\fP, the old certificate chain is replaced with the new certificate chain in the reply. The old chain can only be replaced if a valid \f2keypass\fP, the password used to protect the private key of the entry, is supplied. If no password is provided, and the private key password is different from the keystore password, the user is prompted for it.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   334
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   335
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   336
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   337
This command was named \f2\-import\fP in previous releases. This old name is still supported in this release and will be supported in future releases, but for clarify the new name, \f2\-importcert\fP, is preferred going forward.    
90ce3da70b43 Initial load
duke
parents:
diff changeset
   338
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   339
\-importkeystore \-srckeystore srckeystore \-destkeystore destkeystore {\-srcstoretype srcstoretype} {\-deststoretype deststoretype} [\-srcstorepass srcstorepass] [\-deststorepass deststorepass] {\-srcprotected} {\-destprotected} {\-srcalias srcalias {\-destalias destalias} [\-srckeypass srckeypass] [\-destkeypass destkeypass] } {\-noprompt} {\-srcProviderName src_provider_name} {\-destProviderName dest_provider_name} {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v} {\-protected} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   340
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   341
Imports a single entry or all entries from a source keystore to a destination keystore. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   342
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   343
When the \f2srcalias\fP option is provided, the command imports the single entry identified by the alias to the destination keystore. If a destination alias is not provided with \f2destalias\fP, then \f2srcalias\fP is used as the destination alias. If the source entry is protected by a password, \f2srckeypass\fP will be used to recover the entry. If \f2srckeypass\fP is not provided, then \f3keytool\fP will attempt to use \f2srcstorepass\fP to recover the entry. If \f2srcstorepass\fP is either not provided or is incorrect, the user will be prompted for a password. The destination entry will be protected using \f2destkeypass\fP. If \f2destkeypass\fP is not provided, the destination entry will be protected with the source entry password. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   344
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   345
If the \f2srcalias\fP option is not provided, then all entries in the source keystore are imported into the destination keystore. Each destination entry will be stored under the alias from the source entry. If the source entry is protected by a password, \f2srcstorepass\fP will be used to recover the entry. If \f2srcstorepass\fP is either not provided or is incorrect, the user will be prompted for a password. If a source keystore entry type is not supported in the destination keystore, or if an error occurs while storing an entry into the destination keystore, the user will be prompted whether to skip the entry and continue, or to quit. The destination entry will be protected with the source entry password. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   346
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   347
If the destination alias already exists in the destination keystore, the user is prompted to either overwrite the entry, or to create a new entry under a different alias name. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   348
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   349
Note that if \f2\-noprompt\fP is provided, the user will not be prompted for a new destination alias. Existing entries will automatically be overwritten with the destination alias name. Finally, entries that can not be imported are automatically skipped and a warning is output.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   350
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   351
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   352
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   353
Exporting Data
90ce3da70b43 Initial load
duke
parents:
diff changeset
   354
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   355
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   356
90ce3da70b43 Initial load
duke
parents:
diff changeset
   357
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   358
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   359
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   360
\-certreq {\-alias alias} {\-sigalg sigalg} {\-file certreq_file} [\-keypass keypass] {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerName provider_name} {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v} {\-protected} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   361
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   362
Generates a Certificate Signing Request (CSR), using the PKCS#10 format. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   363
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   364
A CSR is intended to be sent to a certificate authority (CA). The CA will authenticate the certificate requestor (usually off\-line) and will return a certificate or certificate chain, used to replace the existing certificate chain (which initially consists of a self\-signed certificate) in the keystore. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   365
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   366
The private key and X.500 Distinguished Name associated with \f2alias\fP are used to create the PKCS#10 certificate request. In order to access the private key, the appropriate password must be provided, since private keys are protected in the keystore with a password. If \f2keypass\fP is not provided at the command line, and is different from the password used to protect the integrity of the keystore, the user is prompted for it. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   367
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   368
\f2sigalg\fP specifies the algorithm that should be used to sign the CSR. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   369
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   370
The CSR is stored in the file \f2certreq_file\fP. If no file is given, the CSR is output to stdout. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   371
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   372
Use the \f2importcert\fP command to import the response from the CA.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   373
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   374
\-exportcert {\-alias alias} {\-file cert_file} {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerName provider_name} {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-rfc} {\-v} {\-protected} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   375
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   376
Reads (from the keystore) the certificate associated with \f2alias\fP, and stores it in the file \f2cert_file\fP. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   377
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   378
If no file is given, the certificate is output to stdout. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   379
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   380
The certificate is by default output in binary encoding, but will instead be output in the printable encoding format, as defined by the Internet RFC 1421 standard, if the \f2\-rfc\fP option is specified. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   381
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   382
If \f2alias\fP refers to a trusted certificate, that certificate is output. Otherwise, \f2alias\fP refers to a key entry with an associated certificate chain. In that case, the first certificate in the chain is returned. This certificate authenticates the public key of the entity addressed by \f2alias\fP. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   383
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   384
This command was named \f2\-export\fP in previous releases. This old name is still supported in this release and will be supported in future releases, but for clarify the new name, \f2\-exportcert\fP, is preferred going forward.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   385
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   386
90ce3da70b43 Initial load
duke
parents:
diff changeset
   387
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   388
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   389
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   390
Displaying Data
90ce3da70b43 Initial load
duke
parents:
diff changeset
   391
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   392
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   393
90ce3da70b43 Initial load
duke
parents:
diff changeset
   394
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   395
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   396
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   397
\-list {\-alias alias} {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerName provider_name} {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v | \-rfc} {\-protected} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   398
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   399
Prints (to stdout) the contents of the keystore entry identified by \f2alias\fP. If no alias is specified, the contents of the entire keystore are printed. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   400
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   401
This command by default prints the MD5 fingerprint of a certificate. If the \f2\-v\fP option is specified, the certificate is printed in human\-readable format, with additional information such as the owner, issuer, serial number, and any extensions. If the \f2\-rfc\fP option is specified, certificate contents are printed using the printable encoding format, as defined by the Internet RFC 1421 standard 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   402
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   403
You cannot specify both \f2\-v\fP and \f2\-rfc\fP.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   404
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   405
\-printcert {\-file cert_file} {\-v} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   406
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   407
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   408
Internet RFC 1421 standard. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   409
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   410
Note: This option can be used independently of a keystore.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   411
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   412
90ce3da70b43 Initial load
duke
parents:
diff changeset
   413
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   414
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   415
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   416
Managing the Keystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   417
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   418
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   419
90ce3da70b43 Initial load
duke
parents:
diff changeset
   420
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   421
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   422
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   423
\-storepasswd [\-new new_storepass] {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerName provider_name} {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   424
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   425
Changes the password used to protect the integrity of the keystore contents. The new password is \f2new_storepass\fP, which must be at least 6 characters long.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   426
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   427
\-keypasswd {\-alias alias} [\-keypass old_keypass] [\-new new_keypass] {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerName provider_name} {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   428
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   429
Changes the password under which the private/secret key identified by \f2alias\fP is protected, from \f2old_keypass\fP to \f2new_keypass\fP, which must be at least 6 characters long. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   430
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   431
If the \f2\-keypass\fP option is not provided at the command line, and the key password is different from the keystore password, the user is prompted for it. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   432
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   433
If the \f2\-new\fP option is not provided at the command line, the user is prompted for it.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   434
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   435
\-delete [\-alias alias] {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerName provider_name} {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v} {\-protected} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   436
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   437
Deletes from the keystore the entry identified by \f2alias\fP. The user is prompted for the alias, if no alias is provided at the command line.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   438
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   439
\-changealias {\-alias alias} [\-destalias destalias] [\-keypass keypass] {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerName provider_name} {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v} {\-protected} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   440
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   441
Move an existing keystore entry from the specified \f2alias\fP to a new alias, \f2destalias\fP. If no destination alias is provided, the command will prompt for one. If the original entry is protected with an entry password, the password can be supplied via the "\-keypass" option. If no key password is provided, the \f2storepass\fP (if given) will be attempted first. If that attempt fails, the user will be prompted for a password.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   442
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   443
90ce3da70b43 Initial load
duke
parents:
diff changeset
   444
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   445
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   446
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   447
Getting Help
90ce3da70b43 Initial load
duke
parents:
diff changeset
   448
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   449
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   450
90ce3da70b43 Initial load
duke
parents:
diff changeset
   451
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   452
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   453
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   454
\-help 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   455
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   456
Lists the basic commands and their options.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   457
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   458
90ce3da70b43 Initial load
duke
parents:
diff changeset
   459
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   460
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   461
.SH "EXAMPLES"
90ce3da70b43 Initial load
duke
parents:
diff changeset
   462
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   463
90ce3da70b43 Initial load
duke
parents:
diff changeset
   464
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   465
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   466
Suppose you want to create a keystore for managing your public/private key pair and certificates from entities you trust.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   467
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   468
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   469
Generating Your Key Pair
90ce3da70b43 Initial load
duke
parents:
diff changeset
   470
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   471
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   472
90ce3da70b43 Initial load
duke
parents:
diff changeset
   473
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   474
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   475
The first thing you need to do is create a keystore and generate the key pair. You could use a command such as the following:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   476
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   477
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   478
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   479
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   480
    keytool \-genkeypair \-dname "cn=Mark Jones, ou=JavaSoft, o=Sun, c=US"
90ce3da70b43 Initial load
duke
parents:
diff changeset
   481
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   482
      \-alias business \-keypass kpi135 \-keystore /working/mykeystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   483
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   484
      \-storepass ab987c \-validity 180
90ce3da70b43 Initial load
duke
parents:
diff changeset
   485
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   486
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   487
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   488
90ce3da70b43 Initial load
duke
parents:
diff changeset
   489
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   490
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   491
(Please note: This must be typed as a single line. Multiple lines are used in the examples just for legibility purposes.)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   492
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   493
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   494
This command creates the keystore named "mykeystore" in the "working" directory (assuming it doesn't already exist), and assigns it the password "ab987c". It generates a public/private key pair for the entity whose "distinguished name" has a common name of "Mark Jones", organizational unit of "JavaSoft", organization of "Sun" and two\-letter country code of "US". It uses the default "DSA" key generation algorithm to create the keys, both 1024 bits long.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   495
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   496
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   497
It creates a self\-signed certificate (using the default "SHA1withDSA" signature algorithm) that includes the public key and the distinguished name information. This certificate will be valid for 180 days, and is associated with the private key in a keystore entry referred to by the alias "business". The private key is assigned the password "kpi135".
90ce3da70b43 Initial load
duke
parents:
diff changeset
   498
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   499
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   500
The command could be significantly shorter if option defaults were accepted. As a matter of fact, no options are required; defaults are used for unspecified options that have default values, and you are prompted for any required values. Thus, you could simply have the following:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   501
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   502
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   503
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   504
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   505
    keytool \-genkeypair
90ce3da70b43 Initial load
duke
parents:
diff changeset
   506
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   507
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   508
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   509
90ce3da70b43 Initial load
duke
parents:
diff changeset
   510
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   511
In this case, a keystore entry with alias "mykey" is created, with a newly\-generated key pair and a certificate that is valid for 90 days. This entry is placed in the keystore named ".keystore" in your home directory. (The keystore is created if it doesn't already exist.) You will be prompted for the distinguished name information, the keystore password, and the private key password. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   512
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   513
The rest of the examples assume you executed the \f2\-genkeypair\fP command without options specified, and that you responded to the prompts with values equal to those given in the first \f2\-genkeypair\fP command, above (a private key password of "kpi135", etc.)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   514
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   515
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   516
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   517
Requesting a Signed Certificate from a Certification Authority
90ce3da70b43 Initial load
duke
parents:
diff changeset
   518
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   519
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   520
90ce3da70b43 Initial load
duke
parents:
diff changeset
   521
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   522
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   523
So far all we've got is a self\-signed certificate. A certificate is more likely to be trusted by others if it is signed by a Certification Authority (CA). To get such a signature, you first generate a Certificate Signing Request (CSR), via the following:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   524
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   525
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   526
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   527
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   528
    keytool \-certreq \-file MarkJ.csr
90ce3da70b43 Initial load
duke
parents:
diff changeset
   529
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   530
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   531
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   532
90ce3da70b43 Initial load
duke
parents:
diff changeset
   533
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   534
This creates a CSR (for the entity identified by the default alias "mykey") and puts the request in the file named "MarkJ.csr". Submit this file to a CA, such as VeriSign, Inc. The CA will authenticate you, the requestor (usually off\-line), and then will return a certificate, signed by them, authenticating your public key. (In some cases, they will actually return a chain of certificates, each one authenticating the public key of the signer of the previous certificate in the chain.)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   535
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   536
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   537
Importing a Certificate for the CA
90ce3da70b43 Initial load
duke
parents:
diff changeset
   538
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   539
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   540
90ce3da70b43 Initial load
duke
parents:
diff changeset
   541
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   542
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   543
You need to replace your self\-signed certificate with a certificate chain, where each certificate in the chain authenticates the public key of the signer of the previous certificate in the chain, up to a "root" CA.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   544
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   545
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   546
Before you import the certificate reply from a CA, you need one or more "trusted certificates" in your keystore or in the \f2cacerts\fP keystore file (which is described in importcert command):
90ce3da70b43 Initial load
duke
parents:
diff changeset
   547
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   548
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   549
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   550
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   551
If the certificate reply is a certificate chain, you just need the top certificate of the chain (that is, the "root" CA certificate authenticating that CA's public key). 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   552
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   553
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   554
If the certificate reply is a single certificate, you need a certificate for the issuing CA (the one that signed it), and if that certificate is not self\-signed, you need a certificate for its signer, and so on, up to a self\-signed "root" CA certificate. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   555
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   556
90ce3da70b43 Initial load
duke
parents:
diff changeset
   557
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   558
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   559
The "cacerts" keystore file ships with five VeriSign root CA certificates, so you probably won't need to import a VeriSign certificate as a trusted certificate in your keystore. But if you request a signed certificate from a different CA, and a certificate authenticating that CA's public key hasn't been added to "cacerts", you will need to import a certificate from the CA as a "trusted certificate".
90ce3da70b43 Initial load
duke
parents:
diff changeset
   560
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   561
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   562
A certificate from a CA is usually either self\-signed, or signed by another CA (in which case you also need a certificate authenticating that CA's public key). Suppose company ABC, Inc., is a CA, and you obtain a file named "ABCCA.cer" that is purportedly a self\-signed certificate from ABC, authenticating that CA's public key.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   563
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   564
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   565
Be very careful to ensure the certificate is valid prior to importing it as a "trusted" certificate! View it first (using the \f3keytool\fP \f2\-printcert\fP command, or the \f3keytool\fP \f2\-importcert\fP command without the \f2\-noprompt\fP option), and make sure that the displayed certificate fingerprint(s) match the expected ones. You can call the person who sent the certificate, and compare the fingerprint(s) that you see with the ones that they show (or that a secure public key repository shows). Only if the fingerprints are equal is it guaranteed that the certificate has not been replaced in transit with somebody else's (for example, an attacker's) certificate. If such an attack took place, and you did not check the certificate before you imported it, you would end up trusting anything the attacker has signed.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   566
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   567
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   568
If you trust that the certificate is valid, then you can add it to your keystore via the following:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   569
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   570
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   571
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   572
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   573
    keytool \-importcert \-alias abc \-file ABCCA.cer
90ce3da70b43 Initial load
duke
parents:
diff changeset
   574
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   575
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   576
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   577
90ce3da70b43 Initial load
duke
parents:
diff changeset
   578
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   579
This creates a "trusted certificate" entry in the keystore, with the data from the file "ABCCA.cer", and assigns the alias "abc" to the entry.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   580
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   581
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   582
Importing the Certificate Reply from the CA
90ce3da70b43 Initial load
duke
parents:
diff changeset
   583
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   584
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   585
90ce3da70b43 Initial load
duke
parents:
diff changeset
   586
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   587
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   588
Once you've imported a certificate authenticating the public key of the CA you submitted your certificate signing request to (or there's already such a certificate in the "cacerts" file), you can import the certificate reply and thereby replace your self\-signed certificate with a certificate chain. This chain is the one returned by the CA in response to your request (if the CA reply is a chain), or one constructed (if the CA reply is a single certificate) using the certificate reply and trusted certificates that are already available in the keystore where you import the reply or in the "cacerts" keystore file.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   589
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   590
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   591
For example, suppose you sent your certificate signing request to VeriSign. You can then import the reply via the following, which assumes the returned certificate is named "VSMarkJ.cer":
90ce3da70b43 Initial load
duke
parents:
diff changeset
   592
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   593
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   594
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   595
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   596
    keytool \-importcert \-trustcacerts \-file VSMarkJ.cer
90ce3da70b43 Initial load
duke
parents:
diff changeset
   597
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   598
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   599
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   600
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   601
90ce3da70b43 Initial load
duke
parents:
diff changeset
   602
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   603
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   604
Exporting a Certificate Authenticating Your Public Key
90ce3da70b43 Initial load
duke
parents:
diff changeset
   605
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   606
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   607
90ce3da70b43 Initial load
duke
parents:
diff changeset
   608
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   609
Suppose you have used the 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   610
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
   611
\f2jarsigner\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
   612
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   613
http://java.sun.com/javase/6/docs/tooldocs/solaris/jarsigner.html tool to sign a Java ARchive (JAR) file. Clients that want to use the file will want to authenticate your signature. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   614
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   615
One way they can do this is by first importing your public key certificate into their keystore as a "trusted" entry. You can export the certificate and supply it to your clients. As an example, you can copy your certificate to a file named \f2MJ.cer\fP via the following, assuming the entry is aliased by "mykey":
90ce3da70b43 Initial load
duke
parents:
diff changeset
   616
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   617
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   618
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   619
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   620
    keytool \-exportcert \-alias mykey \-file MJ.cer
90ce3da70b43 Initial load
duke
parents:
diff changeset
   621
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   622
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   623
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   624
90ce3da70b43 Initial load
duke
parents:
diff changeset
   625
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   626
Given that certificate, and the signed JAR file, a client can use the \f3jarsigner\fP tool to authenticate your signature.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   627
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   628
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   629
Importing Keystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   630
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   631
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   632
90ce3da70b43 Initial load
duke
parents:
diff changeset
   633
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   634
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   635
The command "importkeystore" is used to import an entire keystore into another keystore, which means all entries from the source keystore, including keys and certificates, are all imported to the destination keystore within a single command. You can use this command to import entries from a different type of keystore. During the import, all new entries in the destination keystore will have the same alias names and protection passwords (for secret keys and private keys). If \f3keytool\fP has difficulties recover the private keys or secret keys from the source keystore, it will prompt you for a password. If it detects alias duplication, it will ask you for a new one, you can specify a new alias or simply allow \f3keytool\fP to overwrite the existing one.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   636
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   637
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   638
For example, to import entries from a normal JKS type keystore key.jks into a PKCS #11 type hardware based keystore, you can use the command:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   639
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   640
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   641
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   642
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   643
keytool \-importkeystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   644
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   645
    \-srckeystore key.jks \-destkeystore NONE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   646
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   647
    \-srcstoretype JKS \-deststoretype PKCS11
90ce3da70b43 Initial load
duke
parents:
diff changeset
   648
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   649
    \-srcstorepass changeit \-deststorepass topsecret
90ce3da70b43 Initial load
duke
parents:
diff changeset
   650
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   651
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   652
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   653
90ce3da70b43 Initial load
duke
parents:
diff changeset
   654
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   655
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   656
The importkeystore command can also be used to import a single entry from a source keystore to a destination keystore. In this case, besides the options you see in the above example, you need to specify the alias you want to import. With the srcalias option given, you can also specify the desination alias name in the command line, as well as protection password for a secret/private key and the destination protection password you want. In this way, you can issue a \f3keytool\fP command that will never ask you a question. This makes it very convenient to include a \f3keytool\fP command into a script file, like this:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   657
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   658
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   659
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   660
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   661
keytool \-importkeystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   662
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   663
    \-srckeystore key.jks \-destkeystore NONE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   664
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   665
    \-srcstoretype JKS \-deststoretype PKCS11
90ce3da70b43 Initial load
duke
parents:
diff changeset
   666
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   667
    \-srcstorepass changeit \-deststorepass topsecret
90ce3da70b43 Initial load
duke
parents:
diff changeset
   668
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   669
    \-srcalias myprivatekey \-destalias myoldprivatekey
90ce3da70b43 Initial load
duke
parents:
diff changeset
   670
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   671
    \-srckeypass oldkeypass \-destkeypass mynewkeypass
90ce3da70b43 Initial load
duke
parents:
diff changeset
   672
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   673
    \-noprompt
90ce3da70b43 Initial load
duke
parents:
diff changeset
   674
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   675
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   676
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   677
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   678
90ce3da70b43 Initial load
duke
parents:
diff changeset
   679
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   680
.SH "TERMINOLOGY and WARNINGS"
90ce3da70b43 Initial load
duke
parents:
diff changeset
   681
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   682
90ce3da70b43 Initial load
duke
parents:
diff changeset
   683
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   684
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   685
KeyStore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   686
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   687
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   688
90ce3da70b43 Initial load
duke
parents:
diff changeset
   689
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   690
A keystore is a storage facility for cryptographic keys and certificates.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   691
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   692
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   693
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   694
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   695
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   696
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   697
\f3KeyStore Entries\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   698
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   699
90ce3da70b43 Initial load
duke
parents:
diff changeset
   700
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   701
Keystores may have different types of entries. The two most applicable entry types for \f3keytool\fP include: 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   702
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   703
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   704
1.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   705
\f3key entries\fP \- each holds very sensitive cryptographic key information, which is stored in a protected format to prevent unauthorized access. Typically, a key stored in this type of entry is a secret key, or a private key accompanied by the certificate "chain" for the corresponding public key. The \f3keytool\fP can handle both types od entry, while \f3jarsigner\fP tool only handle the latter type of entry, that is private keys and their associated certificate chains. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   706
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   707
2.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   708
\f3trusted certificate entries\fP \- each contains a single public key certificate belonging to another party. It is called a "trusted certificate" because the keystore owner trusts that the public key in the certificate indeed belongs to the identity identified by the "subject" (owner) of the certificate. The issuer of the certificate vouches for this, by signing the certificate. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   709
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   710
90ce3da70b43 Initial load
duke
parents:
diff changeset
   711
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   712
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   713
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   714
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   715
\f3KeyStore Aliases\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   716
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   717
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   718
All keystore entries (key and trusted certificate entries) are accessed via unique \f2aliases\fP.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   719
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   720
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   721
An alias is specified when you add an entity to the keystore using the \-genseckey command to generate a secret key, \-genkeypair command to generate a key pair (public and private key) or the \-importcert command to add a certificate or certificate chain to the list of trusted certificates. Subsequent \f3keytool\fP commands must use this same alias to refer to the entity.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   722
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   723
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   724
For example, suppose you use the alias \f2duke\fP to generate a new public/private key pair and wrap the public key into a self\-signed certificate (see Certificate Chains) via the following command:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   725
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   726
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   727
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   728
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   729
    keytool \-genkeypair \-alias duke \-keypass dukekeypasswd
90ce3da70b43 Initial load
duke
parents:
diff changeset
   730
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   731
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   732
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   733
90ce3da70b43 Initial load
duke
parents:
diff changeset
   734
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   735
This specifies an inital password of "dukekeypasswd" required by subsequent commands to access the private key assocated with the alias \f2duke\fP. If you later want to change duke's private key password, you use a command like the following: 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   736
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   737
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   738
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   739
    keytool \-keypasswd \-alias duke \-keypass dukekeypasswd \-new newpass
90ce3da70b43 Initial load
duke
parents:
diff changeset
   740
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   741
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   742
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   743
90ce3da70b43 Initial load
duke
parents:
diff changeset
   744
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   745
This changes the password from "dukekeypasswd" to "newpass". 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   746
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   747
Please note: A password should not actually be specified on a command line or in a script unless it is for testing purposes, or you are on a secure system. If you don't specify a required password option on a command line, you will be prompted for it.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   748
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   749
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   750
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   751
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   752
\f3KeyStore Implementation\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   753
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   754
The \f2KeyStore\fP class provided in the \f2java.security\fP package supplies well\-defined interfaces to access and modify the information in a keystore. It is possible for there to be multiple different concrete implementations, where each implementation is that for a particular \f2type\fP of keystore. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   755
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   756
Currently, two command\-line tools (\f3keytool\fP and \f3jarsigner\fP) and a GUI\-based tool named \f3Policy Tool\fP make use of keystore implementations. Since \f2KeyStore\fP is publicly available, users can write additional security applications that use it.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   757
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   758
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   759
There is a built\-in default implementation, provided by Sun Microsystems. It implements the keystore as a file, utilizing a proprietary keystore type (format) named "JKS". It protects each private key with its individual password, and also protects the integrity of the entire keystore with a (possibly different) password.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   760
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   761
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   762
Keystore implementations are provider\-based. More specifically, the application interfaces supplied by \f2KeyStore\fP are implemented in terms of a "Service Provider Interface" (SPI). That is, there is a corresponding abstract \f2KeystoreSpi\fP class, also in the \f2java.security\fP package, which defines the Service Provider Interface methods that "providers" must implement. (The term "provider" refers to a package or a set of packages that supply a concrete implementation of a subset of services that can be accessed by the Java Security API.) Thus, to provide a keystore implementation, clients must implement a "provider" and supply a KeystoreSpi subclass implementation, as described in How to Implement a Provider for the Java Cryptography Architecture.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   763
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   764
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   765
Applications can choose different \f2types\fP of keystore implementations from different providers, using the "getInstance" factory method supplied in the \f2KeyStore\fP class. A keystore type defines the storage and data format of the keystore information, and the algorithms used to protect private/secret keys in the keystore and the integrity of the keystore itself. Keystore implementations of different types are not compatible.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   766
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   767
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   768
\f3keytool\fP works on any file\-based keystore implementation. (It treats the keytore location that is passed to it at the command line as a filename and converts it to a FileInputStream, from which it loads the keystore information.) The \f3jarsigner\fP and \f3policytool\fP tools, on the other hand, can read a keystore from any location that can be specified using a URL.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   769
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   770
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   771
For \f3keytool\fP and \f3jarsigner\fP, you can specify a keystore type at the command line, via the \f2\-storetype\fP option. For \f3Policy Tool\fP, you can specify a keystore type via the "Keystore" menu.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   772
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   773
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   774
If you don't explicitly specify a keystore type, the tools choose a keystore implementation based simply on the value of the \f2keystore.type\fP property specified in the security properties file. The security properties file is called \f2java.security\fP, and it resides in the security properties directory, \f2java.home\fP/lib/security, where \f2java.home\fP is the runtime environment's directory (the \f2jre\fP directory in the SDK or the top\-level directory of the Java 2 Runtime Environment).
90ce3da70b43 Initial load
duke
parents:
diff changeset
   775
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   776
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   777
Each tool gets the \f2keystore.type\fP value and then examines all the currently\-installed providers until it finds one that implements keystores of that type. It then uses the keystore implementation from that provider.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   778
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   779
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   780
The \f2KeyStore\fP class defines a static method named \f2getDefaultType\fP that lets applications and applets retrieve the value of the \f2keystore.type\fP property. The following line of code creates an instance of the default keystore type (as specified in the \f2keystore.type\fP property):
90ce3da70b43 Initial load
duke
parents:
diff changeset
   781
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   782
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   783
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   784
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   785
    KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());
90ce3da70b43 Initial load
duke
parents:
diff changeset
   786
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   787
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   788
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   789
90ce3da70b43 Initial load
duke
parents:
diff changeset
   790
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   791
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   792
The default keystore type is "jks" (the proprietary type of the keystore implementation provided by Sun). This is specified by the following line in the security properties file:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   793
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   794
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   795
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   796
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   797
    keystore.type=jks
90ce3da70b43 Initial load
duke
parents:
diff changeset
   798
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   799
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   800
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   801
90ce3da70b43 Initial load
duke
parents:
diff changeset
   802
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   803
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   804
To have the tools utilize a keystore implementation other than the default, you can change that line to specify a different keystore type.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   805
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   806
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   807
For example, if you have a provider package that supplies a keystore implementation for a keystore type called "pkcs12", change the line to
90ce3da70b43 Initial load
duke
parents:
diff changeset
   808
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   809
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   810
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   811
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   812
    keystore.type=pkcs12
90ce3da70b43 Initial load
duke
parents:
diff changeset
   813
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   814
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   815
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   816
90ce3da70b43 Initial load
duke
parents:
diff changeset
   817
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   818
Note: case doesn't matter in keystore type designations. For example, "JKS" would be considered the same as "jks".
90ce3da70b43 Initial load
duke
parents:
diff changeset
   819
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   820
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   821
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   822
Certificate
90ce3da70b43 Initial load
duke
parents:
diff changeset
   823
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   824
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   825
90ce3da70b43 Initial load
duke
parents:
diff changeset
   826
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   827
A \f3certificate\fP (also known as a \f3public\-key certificate\fP) is a digitally signed statement from one entity (the \f2issuer\fP), saying that the public key (and some other information) of another entity (the \f2subject\fP) has some specific value.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   828
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   829
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   830
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   831
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   832
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   833
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   834
\f3Certificate Terms\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   835
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   836
90ce3da70b43 Initial load
duke
parents:
diff changeset
   837
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   838
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   839
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   840
Public Keys 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   841
These are numbers associated with a particular entity, and are intended to be known to everyone who needs to have trusted interactions with that entity. Public keys are used to verify signatures. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   842
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   843
Digitally Signed 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   844
If some data is \f2digitally signed\fP it has been stored with the "identity" of an entity, and a signature that proves that entity knows about the data. The data is rendered unforgeable by signing with the entity's private key. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   845
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   846
Identity 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   847
A known way of addressing an entity. In some systems the identity is the public key, in others it can be anything from a Unix UID to an Email address to an X.509 Distinguished Name. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   848
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   849
Signature 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   850
A signature is computed over some data using the private key of an entity (the \f2signer\fP, which in the case of a certificate is also known as the \f2issuer\fP). 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   851
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   852
Private Keys 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   853
These are numbers, each of which is supposed to be known only to the particular entity whose private key it is (that is, it's supposed to be kept secret). Private and public keys exist in pairs in all public key cryptography systems (also referred to as "public key crypto systems"). In a typical public key crypto system, such as DSA, a private key corresponds to exactly one public key. Private keys are used to compute signatures. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   854
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   855
Entity 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   856
An entity is a person, organization, program, computer, business, bank, or something else you are trusting to some degree. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   857
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   858
90ce3da70b43 Initial load
duke
parents:
diff changeset
   859
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   860
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   861
Basically, public key cryptography requires access to users' public keys. In a large\-scale networked environment it is impossible to guarantee that prior relationships between communicating entities have been established or that a trusted repository exists with all used public keys. Certificates were invented as a solution to this public key distribution problem. Now a \f2Certification Authority\fP (CA) can act as a trusted third party. CAs are entities (for example, businesses) that are trusted to sign (issue) certificates for other entities. It is assumed that CAs will only create valid and reliable certificates, as they are bound by legal agreements. There are many public Certification Authorities, such as 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   862
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
   863
\f2VeriSign\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
   864
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   865
http://www.verisign.com/, 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   866
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
   867
\f2Thawte\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
   868
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   869
http://www.thawte.com/, 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   870
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
   871
\f2Entrust\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
   872
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   873
http://www.entrust.com/, and so on. You can also run your own Certification Authority using products such as the Netscape/Microsoft Certificate Servers or the Entrust CA product for your organization.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   874
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   875
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   876
Using \f3keytool\fP, it is possible to display, import, and export certificates. It is also possible to generate self\-signed certificates.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   877
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   878
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   879
\f3keytool\fP currently handles X.509 certificates.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   880
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   881
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   882
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   883
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   884
\f3X.509 Certificates\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   885
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   886
The X.509 standard defines what information can go into a certificate, and describes how to write it down (the data format). All the data in a certificate is encoded using two related standards called ASN.1/DER. \f2Abstract Syntax Notation 1\fP describes data. The \f2Definite Encoding Rules\fP describe a single way to store and transfer that data. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   887
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   888
All X.509 certificates have the following data, in addition to the signature:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   889
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   890
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   891
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   892
Version 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   893
This identifies which version of the X.509 standard applies to this certificate, which affects what information can be specified in it. Thus far, three versions are defined. \f3keytool\fP can import and export v1, v2, and v3 certificates. It generates v3 certificates. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   894
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   895
\f2X.509 Version 1\fP has been available since 1988, is widely deployed, and is the most generic. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   896
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   897
\f2X.509 Version 2\fP introduced the concept of subject and issuer unique identifiers to handle the possibility of reuse of subject and/or issuer names over time. Most certificate profile documents strongly recommend that names not be reused, and that certificates should not make use of unique identifiers. Version 2 certificates are not widely used. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   898
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   899
\f2X.509 Version 3\fP is the most recent (1996) and supports the notion of extensions, whereby anyone can define an extension and include it in the certificate. Some common extensions in use today are: \f2KeyUsage\fP (limits the use of the keys to particular purposes such as "signing\-only") and \f2AlternativeNames\fP (allows other identities to also be associated with this public key, e.g. DNS names, Email addresses, IP addresses). Extensions can be marked \f2critical\fP to indicate that the extension should be checked and enforced/used. For example, if a certificate has the KeyUsage extension marked critical and set to "keyCertSign" then if this certificate is presented during SSL communication, it should be rejected, as the certificate extension indicates that the associated private key should only be used for signing certificates and not for SSL use.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   900
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   901
Serial Number 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   902
The entity that created the certificate is responsible for assigning it a serial number to distinguish it from other certificates it issues. This information is used in numerous ways, for example when a certificate is revoked its serial number is placed in a Certificate Revocation List (CRL). 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   903
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   904
Signature Algorithm Identifier 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   905
This identifies the algorithm used by the CA to sign the certificate. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   906
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   907
Issuer Name 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   908
The X.500 Distinguished Name of the entity that signed the certificate. This is normally a CA. Using this certificate implies trusting the entity that signed this certificate. (Note that in some cases, such as \f2root or top\-level\fP CA certificates, the issuer signs its own certificate.) 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   909
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   910
Validity Period 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   911
Each certificate is valid only for a limited amount of time. This period is described by a start date and time and an end date and time, and can be as short as a few seconds or almost as long as a century. The validity period chosen depends on a number of factors, such as the strength of the private key used to sign the certificate or the amount one is willing to pay for a certificate. This is the expected period that entities can rely on the public value, if the associated private key has not been compromised. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   912
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   913
Subject Name 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   914
The name of the entity whose public key the certificate identifies. This name uses the X.500 standard, so it is intended to be unique across the Internet. This is the X.500 Distinguished Name (DN) of the entity, for example, 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   915
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   916
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   917
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   918
    CN=Java Duke, OU=Java Software Division, O=Sun Microsystems Inc, C=US
90ce3da70b43 Initial load
duke
parents:
diff changeset
   919
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   920
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   921
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   922
(These refer to the subject's Common Name, Organizational Unit, Organization, and Country.) 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   923
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   924
Subject Public Key Information 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   925
This is the public key of the entity being named, together with an algorithm identifier which specifies which public key crypto system this key belongs to and any associated key parameters. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   926
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   927
90ce3da70b43 Initial load
duke
parents:
diff changeset
   928
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   929
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   930
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   931
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   932
\f3Certificate Chains\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   933
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   934
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   935
\f3keytool\fP can create and manage keystore "key" entries that each contain a private key and an associated certificate "chain". The first certificate in the chain contains the public key corresponding to the private key.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   936
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   937
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   938
When keys are first generated (see the \-genkeypair command), the chain starts off containing a single element, a \f2self\-signed certificate\fP. A self\-signed certificate is one for which the issuer (signer) is the same as the subject (the entity whose public key is being authenticated by the certificate). Whenever the \f2\-genkeypair\fP command is called to generate a new public/private key pair, it also wraps the public key into a self\-signed certificate.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   939
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   940
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   941
Later, after a Certificate Signing Request (CSR) has been generated (see the \-certreq command) and sent to a Certification Authority (CA), the response from the CA is imported (see \-importcert), and the self\-signed certificate is replaced by a chain of certificates. At the bottom of the chain is the certificate (reply) issued by the CA authenticating the subject's public key. The next certificate in the chain is one that authenticates the \f2CA\fP's public key.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   942
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   943
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   944
In many cases, this is a self\-signed certificate (that is, a certificate from the CA authenticating its own public key) and the last certificate in the chain. In other cases, the CA may return a chain of certificates. In this case, the bottom certificate in the chain is the same (a certificate signed by the CA, authenticating the public key of the key entry), but the second certificate in the chain is a certificate signed by a \f2different\fP CA, authenticating the public key of the CA you sent the CSR to. Then, the next certificate in the chain will be a certificate authenticating the second CA's key, and so on, until a self\-signed "root" certificate is reached. Each certificate in the chain (after the first) thus authenticates the public key of the signer of the previous certificate in the chain.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   945
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   946
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   947
Many CAs only return the issued certificate, with no supporting chain, especially when there is a flat hierarchy (no intermediates CAs). In this case, the certificate chain must be established from trusted certificate information already stored in the keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   948
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   949
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   950
A different reply format (defined by the PKCS#7 standard) also includes the supporting certificate chain, in addition to the issued certificate. Both reply formats can be handled by \f3keytool\fP.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   951
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   952
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   953
The top\-level (root) CA certificate is self\-signed. However, the trust into the root's public key does not come from the root certificate itself (anybody could generate a self\-signed certificate with the distinguished name of say, the VeriSign root CA!), but from other sources like a newspaper. The root CA public key is widely known. The only reason it is stored in a certificate is because this is the format understood by most tools, so the certificate in this case is only used as a "vehicle" to transport the root CA's public key. Before you add the root CA certificate to your keystore, you should view it (using the \f2\-printcert\fP option) and compare the displayed fingerprint with the well\-known fingerprint (obtained from a newspaper, the root CA's webpage, etc.).
90ce3da70b43 Initial load
duke
parents:
diff changeset
   954
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   955
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   956
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   957
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   958
\f3The cacerts Certificates File\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   959
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   960
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   961
A certificates file named \f3"cacerts"\fP resides in the security properties directory, \f2java.home\fP/lib/security, where \f2java.home\fP is the runtime environment's directory (the \f2jre\fP directory in the SDK or the top\-level directory of the Java 2 Runtime Environment).
90ce3da70b43 Initial load
duke
parents:
diff changeset
   962
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   963
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   964
The "cacerts" file represents a system\-wide keystore with CA certificates. System administrators can configure and manage that file using \f3keytool\fP, specifying "jks" as the keystore type. The "cacerts" keystore file ships with several root CA certificates with the following aliases and X.500 owner distinguished names:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   965
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   966
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   967
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   968
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   969
\f3Alias\fP: thawtepersonalfreemailca
90ce3da70b43 Initial load
duke
parents:
diff changeset
   970
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   971
\f3Owner DN\fP: EmailAddress=personal\-freemail@thawte.com,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   972
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   973
CN=Thawte Personal Freemail CA,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   974
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   975
OU=Certification Services Division,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   976
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   977
O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   978
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   979
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   980
\f3Alias\fP: thawtepersonalbasicca
90ce3da70b43 Initial load
duke
parents:
diff changeset
   981
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   982
\f3Owner DN\fP: EmailAddress=personal\-basic@thawte.com,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   983
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   984
CN=Thawte Personal Basic CA,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   985
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   986
OU=Certification Services Division,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   987
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   988
O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   989
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   990
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   991
\f3Alias\fP: thawtepersonalpremiumca
90ce3da70b43 Initial load
duke
parents:
diff changeset
   992
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   993
\f3Owner DN\fP: EmailAddress=personal\-premium@thawte.com,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   994
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   995
CN=Thawte Personal Premium CA,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   996
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   997
OU=Certification Services Division,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   998
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   999
O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1000
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1001
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1002
\f3Alias\fP: thawteserverca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1003
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1004
\f3Owner DN\fP: EmailAddress=server\-certs@thawte.com,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1005
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1006
CN=Thawte Server CA, OU=Certification Services Division,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1007
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1008
O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1009
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1010
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1011
\f3Alias\fP: thawtepremiumserverca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1012
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1013
\f3Owner DN\fP: EmailAddress=premium\-server@thawte.com,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1014
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1015
CN=Thawte Premium Server CA,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1016
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1017
OU=Certification Services Division,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1018
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1019
O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1020
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1021
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1022
\f3Alias\fP: verisignclass1ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1023
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1024
\f3Owner DN\fP: OU=Class 1 Public Primary Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1025
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1026
O="VeriSign, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1027
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1028
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1029
\f3Alias\fP: verisignclass2ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1030
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1031
\f3Owner DN\fP: OU=Class 2 Public Primary Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1032
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1033
O="VeriSign, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1034
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1035
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1036
\f3Alias\fP: verisignclass3ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1037
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1038
\f3Owner DN\fP: OU=Class 3 Public Primary Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1039
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1040
O="VeriSign, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1041
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1042
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1043
\f3Alias\fP: verisignserverca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1044
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1045
\f3Owner DN\fP: OU=Secure Server Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1046
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1047
O="RSA Data Security, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1048
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1049
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1050
\f3Alias\fP: verisignclass1g2ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1051
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1052
\f3Owner DN\fP: OU=VeriSign Trust Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1053
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1054
OU="(c) 1998 VeriSign, Inc. \- For authorized use only",
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1055
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1056
OU=Class 1 Public Primary Certification Authority \- G2,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1057
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1058
O="VeriSign, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1059
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1060
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1061
\f3Alias\fP: verisignclass1g3ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1062
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1063
\f3Owner DN\fP: CN=VeriSign Class 1 Public Primary Certification Authority \- G3, OU="(c) 1999 VeriSign, Inc. \- For authorized use only",
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1064
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1065
OU=VeriSign Trust Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1066
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1067
O="VeriSign, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1068
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1069
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1070
\f3Alias\fP: verisignclass2g2ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1071
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1072
\f3Owner DN\fP: OU=VeriSign Trust Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1073
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1074
OU="(c) 1998 VeriSign, Inc. \- For authorized use only",
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1075
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1076
OU=Class 2 Public Primary Certification Authority \- G2,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1077
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1078
O="VeriSign, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1079
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1080
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1081
\f3Alias\fP: verisignclass2g3ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1082
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1083
\f3Owner DN\fP: CN=VeriSign Class 2 Public Primary Certification Authority \- G3,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1084
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1085
OU="(c) 1999 VeriSign, Inc. \- For authorized use only",
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1086
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1087
OU=VeriSign Trust Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1088
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1089
O="VeriSign, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1090
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1091
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1092
\f3Alias\fP: verisignclass3g2ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1093
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1094
\f3Owner DN\fP: OU=VeriSign Trust Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1095
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1096
OU="(c) 1998 VeriSign, Inc. \- For authorized use only",
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1097
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1098
OU=Class 3 Public Primary Certification Authority \- G2,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1099
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1100
O="VeriSign, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1101
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1102
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1103
\f3Alias\fP: verisignclass3g3ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1104
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1105
\f3Owner DN\fP: CN=VeriSign Class 3 Public Primary Certification Authority \- G3,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1106
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1107
OU="(c) 1999 VeriSign, Inc. \- For authorized use only",
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1108
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1109
OU=VeriSign Trust Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1110
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1111
O="VeriSign, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1112
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1113
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1114
\f3Alias\fP: baltimorecodesigningca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1115
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1116
\f3Owner DN\fP: CN=Baltimore CyberTrust Code Signing Root,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1117
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1118
OU=CyberTrust, O=Baltimore, C=IE 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1119
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1120
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1121
\f3Alias\fP: gtecybertrustglobalca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1122
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1123
\f3Owner DN\fP: CN=GTE CyberTrust Global Root,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1124
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1125
OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1126
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1127
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1128
\f3Alias\fP: baltimorecybertrustca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1129
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1130
\f3Owner DN\fP: CN=Baltimore CyberTrust Root,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1131
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1132
OU=CyberTrust, O=Baltimore, C=IE 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1133
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1134
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1135
\f3Alias\fP: gtecybertrustca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1136
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1137
\f3Owner DN\fP: CN=GTE CyberTrust Root,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1138
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1139
O=GTE Corporation, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1140
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1141
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1142
\f3Alias\fP: gtecybertrust5ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1143
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1144
\f3Owner DN\fP: CN=GTE CyberTrust Root 5,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1145
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1146
OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1147
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1148
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1149
\f3Alias\fP: entrustclientca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1150
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1151
\f3Owner DN\fP: CN=Entrust.net Client Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1152
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1153
OU=(c) 1999 Entrust.net Limited,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1154
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1155
OU=www.entrust.net/Client_CA_Info/CPS incorp. by ref. limits liab.,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1156
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1157
O=Entrust.net, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1158
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1159
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1160
\f3Alias\fP: entrustglobalclientca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1161
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1162
\f3Owner DN\fP: CN=Entrust.net Client Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1163
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1164
OU=(c) 2000 Entrust.net Limited,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1165
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1166
OU=www.entrust.net/GCCA_CPS incorp. by ref. (limits liab.),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1167
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1168
O=Entrust.net 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1169
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1170
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1171
\f3Alias\fP: entrust2048ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1172
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1173
\f3Owner DN\fP: CN=Entrust.net Certification Authority (2048),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1174
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1175
OU=(c) 1999 Entrust.net Limited,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1176
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1177
OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1178
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1179
O=Entrust.net 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1180
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1181
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1182
\f3Alias\fP: entrustsslca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1183
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1184
\f3Owner DN\fP: CN=Entrust.net Secure Server Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1185
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1186
OU=(c) 1999 Entrust.net Limited,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1187
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1188
OU=www.entrust.net/CPS incorp. by ref. (limits liab.),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1189
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1190
O=Entrust.net, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1191
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1192
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1193
\f3Alias\fP: entrustgsslca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1194
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1195
\f3Owner DN\fP: CN=Entrust.net Secure Server Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1196
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1197
OU=(c) 2000 Entrust.net Limited,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1198
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1199
OU=www.entrust.net/SSL_CPS incorp. by ref. (limits liab.),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1200
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1201
O=Entrust.net 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1202
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1203
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1204
\f3Alias\fP: godaddyclass2ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1205
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1206
\f3Owner DN\fP: OU=Go Daddy Class 2 Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1207
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1208
O="The Go Daddy Group, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1209
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1210
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1211
\f3Alias\fP: starfieldclass2ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1212
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1213
\f3Owner DN\fP: OU=Starfield Class 2 Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1214
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1215
O="Starfield Technologies, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1216
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1217
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1218
\f3Alias\fP: valicertclass2ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1219
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1220
\f3Owner DN\fP: EMAILADDRESS=info@valicert.com,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1221
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1222
CN=http://www.valicert.com/,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1223
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1224
OU=ValiCert Class 2 Policy Validation Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1225
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1226
O="ValiCert, Inc.", L=ValiCert Validation Network 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1227
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1228
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1229
\f3Alias\fP: geotrustglobalca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1230
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1231
\f3Owner DN\fP: CN=GeoTrust Global CA,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1232
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1233
O=GeoTrust Inc., C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1234
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1235
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1236
\f3Alias\fP: equifaxsecureca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1237
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1238
\f3Owner DN\fP: OU=Equifax Secure Certificate Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1239
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1240
O=Equifax, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1241
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1242
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1243
\f3Alias\fP: equifaxsecureebusinessca1
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1244
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1245
\f3Owner DN\fP: CN=Equifax Secure eBusiness CA\-1,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1246
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1247
O=Equifax Secure Inc., C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1248
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1249
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1250
\f3Alias\fP: equifaxsecureebusinessca2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1251
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1252
\f3Owner DN\fP: OU=Equifax Secure eBusiness CA\-2,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1253
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1254
O=Equifax Secure, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1255
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1256
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1257
\f3Alias\fP: equifaxsecureglobalebusinessca1
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1258
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1259
\f3Owner DN\fP: CN=Equifax Secure Global eBusiness CA\-1,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1260
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1261
O=Equifax Secure Inc., C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1262
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1263
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1264
\f3Alias\fP: soneraclass1ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1265
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1266
\f3Owner DN\fP: CN=Sonera Class1 CA, O=Sonera, C=FI 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1267
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1268
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1269
\f3Alias\fP: soneraclass2ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1270
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1271
\f3Owner DN\fP: CN=Sonera Class2 CA, O=Sonera, C=FI 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1272
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1273
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1274
\f3Alias\fP: comodoaaaca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1275
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1276
\f3Owner DN\fP: CN=AAA Certificate Services,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1277
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1278
O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1279
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1280
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1281
\f3Alias\fP: addtrustclass1ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1282
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1283
\f3Owner DN\fP: CN=AddTrust Class 1 CA Root,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1284
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1285
OU=AddTrust TTP Network, O=AddTrust AB, C=SE 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1286
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1287
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1288
\f3Alias\fP: addtrustexternalca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1289
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1290
\f3Owner DN\fP: CN=AddTrust External CA Root,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1291
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1292
OU=AddTrust External TTP Network, O=AddTrust AB, C=SE 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1293
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1294
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1295
\f3Alias\fP: addtrustqualifiedca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1296
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1297
\f3Owner DN\fP: CN=AddTrust Qualified CA Root,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1298
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1299
OU=AddTrust TTP Network, O=AddTrust AB, C=SE 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1300
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1301
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1302
\f3Alias\fP: utnuserfirsthardwareca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1303
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1304
\f3Owner DN\fP: CN=UTN\-USERFirst\-Hardware,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1305
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1306
OU=http://www.usertrust.com, O=The USERTRUST Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1307
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1308
L=Salt Lake City, ST=UT, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1309
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1310
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1311
\f3Alias\fP: utnuserfirstclientauthemailca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1312
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1313
\f3Owner DN\fP: CN=UTN\-USERFirst\-Client Authentication and Email,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1314
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1315
OU=http://www.usertrust.com, O=The USERTRUST Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1316
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1317
L=Salt Lake City, ST=UT, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1318
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1319
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1320
\f3Alias\fP: utndatacorpsgcca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1321
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1322
\f3Owner DN\fP: CN=UTN \- DATACorp SGC,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1323
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1324
OU=http://www.usertrust.com, O=The USERTRUST Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1325
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1326
L=Salt Lake City, ST=UT, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1327
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1328
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1329
\f3Alias\fP: utnuserfirstobjectca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1330
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1331
\f3Owner DN\fP: CN=UTN\-USERFirst\-Object,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1332
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1333
OU=http://www.usertrust.com, O=The USERTRUST Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1334
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1335
L=Salt Lake City, ST=UT, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1336
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1337
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1338
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1339
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1340
The initial password of the "cacerts" keystore file is "changeit". System administrators should change that password and the default access permission of that file upon installing the SDK.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1341
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1342
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1343
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1344
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1345
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1346
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1347
\f3IMPORTANT: Verify Your \fP\f4cacerts\fP\f3 File\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1348
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1349
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1350
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1351
Since you trust the CAs in the \f2cacerts\fP file as entities for signing and issuing certificates to other entities, you must manage the \f2cacerts\fP file carefully. The \f2cacerts\fP file should contain only certificates of the CAs you trust. It is your responsibility to verify the trusted root CA certificates bundled in the \f2cacerts\fP file and make your own trust decisions. To remove an untrusted CA certificate from the \f2cacerts\fP file, use the delete option of the \f2keytool\fP command. You can find the \f2cacerts\fP file in the JRE installation directory. Contact your system administrator if you do not have permission to edit this file.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1352
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1353
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1354
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1355
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1356
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1357
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1358
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1359
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1360
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1361
\f3The Internet RFC 1421 Certificate Encoding Standard\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1362
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1363
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1364
Certificates are often stored using the printable encoding format defined by the Internet RFC 1421 standard, instead of their binary encoding. This certificate format, also known as "Base 64 encoding", facilitates exporting certificates to other applications by email or through some other mechanism.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1365
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1366
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1367
Certificates read by the \f2\-importcert\fP and \f2\-printcert\fP commands can be in either this format or binary encoded.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1368
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1369
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1370
The \f2\-exportcert\fP command by default outputs a certificate in binary encoding, but will instead output a certificate in the printable encoding format, if the \f2\-rfc\fP option is specified.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1371
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1372
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1373
The \f2\-list\fP command by default prints the MD5 fingerprint of a certificate. If the \f2\-v\fP option is specified, the certificate is printed in human\-readable format, while if the \f2\-rfc\fP option is specified, the certificate is output in the printable encoding format.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1374
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1375
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1376
In its printable encoding format, the encoded certificate is bounded at the beginning by
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1377
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1378
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1379
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1380
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1381
\-\-\-\-\-BEGIN CERTIFICATE\-\-\-\-\-
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1382
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1383
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1384
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1385
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1386
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1387
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1388
and at the end by
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1389
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1390
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1391
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1392
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1393
\-\-\-\-\-END CERTIFICATE\-\-\-\-\-
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1394
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1395
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1396
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1397
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1398
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1399
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1400
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1401
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1402
X.500 Distinguished Names
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1403
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1404
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1405
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1406
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1407
X.500 Distinguished Names are used to identify entities, such as those which are named by the \f2subject\fP and \f2issuer\fP (signer) fields of X.509 certificates. \f3keytool\fP supports the following subparts: 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1408
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1409
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1410
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1411
\f2commonName\fP \- common name of a person, e.g., "Susan Jones" 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1412
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1413
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1414
\f2organizationUnit\fP \- small organization (e.g, department or division) name, e.g., "Purchasing" 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1415
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1416
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1417
\f2organizationName\fP \- large organization name, e.g., "ABCSystems, Inc." 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1418
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1419
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1420
\f2localityName\fP \- locality (city) name, e.g., "Palo Alto" 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1421
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1422
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1423
\f2stateName\fP \- state or province name, e.g., "California" 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1424
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1425
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1426
\f2country\fP \- two\-letter country code, e.g., "CH" 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1427
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1428
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1429
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1430
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1431
When supplying a distinguished name string as the value of a \f2\-dname\fP option, as for the \f2\-genkeypair\fP  command, the string must be in the following format:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1432
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1433
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1434
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1435
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1436
CN=\fP\f4cName\fP\f3, OU=\fP\f4orgUnit\fP\f3, O=\fP\f4org\fP\f3, L=\fP\f4city\fP\f3, S=\fP\f4state\fP\f3, C=\fP\f4countryCode\fP\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1437
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1438
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1439
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1440
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1441
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1442
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1443
where all the italicized items represent actual values and the above keywords are abbreviations for the following:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1444
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1445
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1446
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1447
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1448
       CN=commonName
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1449
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1450
        OU=organizationUnit
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1451
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1452
        O=organizationName
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1453
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1454
        L=localityName
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1455
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1456
        S=stateName
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1457
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1458
        C=country
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1459
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1460
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1461
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1462
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1463
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1464
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1465
A sample distinguished name string is
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1466
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1467
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1468
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1469
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1470
CN=Mark Smith, OU=JavaSoft, O=Sun, L=Cupertino, S=California, C=US
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1471
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1472
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1473
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1474
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1475
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1476
and a sample command using such a string is 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1477
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1478
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1479
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1480
keytool \-genkeypair \-dname "CN=Mark Smith, OU=JavaSoft, O=Sun, L=Cupertino,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1481
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1482
S=California, C=US" \-alias mark
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1483
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1484
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1485
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1486
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1487
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1488
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1489
Case does not matter for the keyword abbreviations. For example, "CN", "cn", and "Cn" are all treated the same.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1490
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1491
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1492
Order matters; each subcomponent must appear in the designated order. However, it is not necessary to have all the subcomponents. You may use a subset, for example:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1493
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1494
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1495
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1496
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1497
CN=Steve Meier, OU=SunSoft, O=Sun, C=US
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1498
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1499
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1500
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1501
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1502
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1503
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1504
If a distinguished name string value contains a comma, the comma must be escaped by a "\\" character when you specify the string on a command line, as in
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1505
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1506
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1507
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1508
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1509
   cn=peter schuster, o=Sun Microsystems\\, Inc., o=sun, c=us
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1510
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1511
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1512
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1513
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1514
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1515
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1516
It is never necessary to specify a distinguished name string on a command line. If it is needed for a command, but not supplied on the command line, the user is prompted for each of the subcomponents. In this case, a comma does not need to be escaped by a "\\".
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1517
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1518
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1519
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1520
WARNING Regarding Importing Trusted Certificates
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1521
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1522
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1523
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1524
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1525
IMPORTANT: Be sure to check a certificate very carefully before importing it as a trusted certificate! 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1526
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1527
View it first (using the \f2\-printcert\fP command, or the \f2\-importcert\fP command without the \f2\-noprompt\fP option), and make sure that the displayed certificate fingerprint(s) match the expected ones. For example, suppose someone sends or emails you a certificate, and you put it in a file named \f2/tmp/cert\fP. Before you consider adding the certificate to your list of trusted certificates, you can execute a \f2\-printcert\fP command to view its fingerprints, as in
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1528
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1529
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1530
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1531
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1532
  keytool \-printcert \-file /tmp/cert
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1533
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1534
    Owner: CN=ll, OU=ll, O=ll, L=ll, S=ll, C=ll
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1535
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1536
    Issuer: CN=ll, OU=ll, O=ll, L=ll, S=ll, C=ll
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1537
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1538
    Serial Number: 59092b34
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1539
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1540
    Valid from: Thu Sep 25 18:01:13 PDT 1997 until: Wed Dec 24 17:01:13 PST 1997
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1541
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1542
    Certificate Fingerprints:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1543
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1544
         MD5:  11:81:AD:92:C8:E5:0E:A2:01:2E:D4:7A:D7:5F:07:6F
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1545
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1546
         SHA1: 20:B6:17:FA:EF:E5:55:8A:D0:71:1F:E8:D6:9D:C0:37:13:0E:5E:FE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1547
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1548
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1549
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1550
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1551
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1552
Then call or otherwise contact the person who sent the certificate, and compare the fingerprint(s) that you see with the ones that they show. Only if the fingerprints are equal is it guaranteed that the certificate has not been replaced in transit with somebody else's (for example, an attacker's) certificate. If such an attack took place, and you did not check the certificate before you imported it, you would end up trusting anything the attacker has signed (for example, a JAR file with malicious class files inside). 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1553
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1554
Note: it is not required that you execute a \f2\-printcert\fP command prior to importing a certificate, since before adding a certificate to the list of trusted certificates in the keystore, the \f2\-importcert\fP command prints out the certificate information and prompts you to verify it. You then have the option of aborting the import operation. Note, however, this is only the case if you invoke the \f2\-importcert\fP command without the \f2\-noprompt\fP option. If the \f2\-noprompt\fP option is given, there is no interaction with the user.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1555
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1556
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1557
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1558
Warning Regarding Passwords
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1559
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1560
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1561
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1562
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1563
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1564
Most commands operating on a keystore require the store password. Some commands require a private/secret key password.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1565
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1566
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1567
Passwords can be specified on the command line (in the \f2\-storepass\fP and \f2\-keypass\fP options, respectively). However, a password should not be specified on a command line or in a script unless it is for testing purposes, or you are on a secure system.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1568
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1569
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1570
If you don't specify a required password option on a command line, you will be prompted for it.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1571
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1572
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1573
.SH "SEE ALSO"
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1574
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1575
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1576
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1577
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1578
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1579
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1580
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1581
\f2jar\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1582
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1583
http://java.sun.com/javase/6/docs/tooldocs/solaris/jar.html tool documentation 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1584
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1585
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1586
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1587
\f2jarsigner\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1588
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1589
http://java.sun.com/javase/6/docs/tooldocs/solaris/jarsigner.html tool documentation 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1590
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1591
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1592
the 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1593
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1594
\f4Security\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1595
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1596
http://java.sun.com/docs/books/tutorial/security/index.html trail of the 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1597
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1598
\f4Java Tutorial\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1599
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1600
http://java.sun.com/docs/books/tutorial/trailmap.html for examples of the use of \f3keytool\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1601
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1602
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1603
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1604
.SH "CHANGES"
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1605
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1606
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1607
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1608
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1609
The command interface for keytool changed in Java SE 6.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1610
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1611
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1612
\f3keytool\fP no longer displays password input when entered by users. Since password input can no longer be viewed when entered, users will be prompted to re\-enter passwords any time a password is being set or changed (for example, when setting the initial keystore password, or when changing a key password).
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1613
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1614
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1615
Some commands have simply been renamed, and other commands deemed obsolete are no longer listed in this document. All previous commands (both renamed and obsolete) are still supported in this release and will continue to be supported in future releases. The following summarizes all of the changes made to the keytool command interface:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1616
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1617
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1618
Renamed commands:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1619
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1620
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1621
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1622
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1623
\f2\-export\fP, renamed to \f2\-exportcert\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1624
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1625
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1626
\f2\-genkey\fP, renamed to \f2\-genkeypair\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1627
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1628
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1629
\f2\-import\fP, renamed to \f2\-importcert\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1630
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1631
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1632
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1633
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1634
Commands deemed obsolete and no longer documented:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1635
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1636
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1637
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1638
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1639
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1640
\f2\-keyclone\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1641
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1642
http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/keytool.html#keycloneCmd 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1643
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1644
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1645
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1646
\f2\-identitydb\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1647
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1648
http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/keytool.html#identitydbCmd 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1649
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1650
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1651
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1652
\f2\-selfcert\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1653
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1654
http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/keytool.html#selfcertCmd 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1655
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1656
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1657
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1658
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1659
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1660