jdk/src/solaris/doc/sun/man/man1/keytool.1
author duke
Sat, 01 Dec 2007 00:00:00 +0000
changeset 2 90ce3da70b43
child 2692 345bc8d65b19
permissions -rw-r--r--
Initial load
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     1
.'" t
90ce3da70b43 Initial load
duke
parents:
diff changeset
     2
." Copyright 2006 Sun Microsystems, Inc.  All Rights Reserved.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     3
." DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     4
."
90ce3da70b43 Initial load
duke
parents:
diff changeset
     5
." This code is free software; you can redistribute it and/or modify it
90ce3da70b43 Initial load
duke
parents:
diff changeset
     6
." under the terms of the GNU General Public License version 2 only, as
90ce3da70b43 Initial load
duke
parents:
diff changeset
     7
." published by the Free Software Foundation.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     8
."
90ce3da70b43 Initial load
duke
parents:
diff changeset
     9
." This code is distributed in the hope that it will be useful, but WITHOUT
90ce3da70b43 Initial load
duke
parents:
diff changeset
    10
." ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    11
." FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
90ce3da70b43 Initial load
duke
parents:
diff changeset
    12
." version 2 for more details (a copy is included in the LICENSE file that
90ce3da70b43 Initial load
duke
parents:
diff changeset
    13
." accompanied this code).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    14
."
90ce3da70b43 Initial load
duke
parents:
diff changeset
    15
." You should have received a copy of the GNU General Public License version
90ce3da70b43 Initial load
duke
parents:
diff changeset
    16
." 2 along with this work; if not, write to the Free Software Foundation,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    17
." Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    18
."
90ce3da70b43 Initial load
duke
parents:
diff changeset
    19
." Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    20
." CA 95054 USA or visit www.sun.com if you need additional information or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    21
." have any questions.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    22
." ` 
90ce3da70b43 Initial load
duke
parents:
diff changeset
    23
.TH keytool 1 "07 Aug 2006"
90ce3da70b43 Initial load
duke
parents:
diff changeset
    24
." Generated by html2man
90ce3da70b43 Initial load
duke
parents:
diff changeset
    25
90ce3da70b43 Initial load
duke
parents:
diff changeset
    26
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    27
.SH NAME
90ce3da70b43 Initial load
duke
parents:
diff changeset
    28
keytool \- Key and Certificate Management Tool
90ce3da70b43 Initial load
duke
parents:
diff changeset
    29
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    30
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
    31
90ce3da70b43 Initial load
duke
parents:
diff changeset
    32
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    33
Manages a keystore (database) of cryptographic keys, X.509 certificate chains, and trusted certificates.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    34
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
    35
.SH "SYNOPSIS"
90ce3da70b43 Initial load
duke
parents:
diff changeset
    36
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    37
90ce3da70b43 Initial load
duke
parents:
diff changeset
    38
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    39
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
    40
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
    41
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
    42
\fP\f3keytool\fP [ commands ]
90ce3da70b43 Initial load
duke
parents:
diff changeset
    43
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
    44
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
    45
90ce3da70b43 Initial load
duke
parents:
diff changeset
    46
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    47
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    48
The keytool command interface has changed in Java SE 6. See the Changes Section for a detailed description. Note that previously defined commands are still supported.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    49
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    50
.SH "DESCRIPTION"
90ce3da70b43 Initial load
duke
parents:
diff changeset
    51
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    52
90ce3da70b43 Initial load
duke
parents:
diff changeset
    53
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    54
\f3keytool\fP is a key and certificate management utility. It allows users to administer their own public/private key pairs and associated certificates for use in self\-authentication (where the user authenticates himself/herself to other users/services) or data integrity and authentication services, using digital signatures. It also allows users to cache the public keys (in the form of certificates) of their communicating peers. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
    55
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    56
A \f2certificate\fP is a digitally signed statement from one entity (person, company, etc.), saying that the public key (and some other information) of some other entity has a particular value. (See Certificates.) When data is digitally signed, the signature can be verified to check the data integrity and authenticity. \f2Integrity\fP means that the data has not been modified or tampered with, and \f2authenticity\fP means the data indeed comes from whoever claims to have created and signed it.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    57
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    58
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    59
\f3keytool\fP also enables users to administer secret keys used in symmetric encryption/decryption (e.g. DES).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    60
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    61
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    62
\f3keytool\fP stores the keys and certificates in a \f2keystore\fP. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
    63
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    64
.SH "COMMAND AND OPTION NOTES"
90ce3da70b43 Initial load
duke
parents:
diff changeset
    65
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    66
90ce3da70b43 Initial load
duke
parents:
diff changeset
    67
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    68
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    69
The various commands and their options are listed and described below . Note:
90ce3da70b43 Initial load
duke
parents:
diff changeset
    70
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    71
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
    72
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    73
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
    74
All command and option names are preceded by a minus sign (\-). 
90ce3da70b43 Initial load
duke
parents:
diff changeset
    75
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    76
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
    77
The options for each command may be provided in any order. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
    78
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    79
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
    80
All items not italicized or in braces or square brackets are required to appear as is. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
    81
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    82
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
    83
Braces surrounding an option generally signify that a default value will be used if the option is not specified on the command line. Braces are also used around the \f2\-v\fP, \f2\-rfc\fP, and \f2\-J\fP options, which only have meaning if they appear on the command line (that is, they don't have any "default" values other than not existing). 
90ce3da70b43 Initial load
duke
parents:
diff changeset
    84
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    85
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
    86
Brackets surrounding an option signify that the user is prompted for the value(s) if the option is not specified on the command line. (For a \f2\-keypass\fP option, if you do not specify the option on the command line, \f3keytool\fP will first attempt to use the keystore password to recover the private/secret key, and if this fails, will then prompt you for the private/secret key password.) 
90ce3da70b43 Initial load
duke
parents:
diff changeset
    87
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    88
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
    89
Items in italics (option values) represent the actual values that must be supplied. For example, here is the format of the \f2\-printcert\fP command: 
90ce3da70b43 Initial load
duke
parents:
diff changeset
    90
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
    91
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
    92
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
    93
  keytool \-printcert {\-file \fP\f4cert_file\fP\f3} {\-v}
90ce3da70b43 Initial load
duke
parents:
diff changeset
    94
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
    95
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    96
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
    97
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
    98
When specifying a \f2\-printcert\fP command, replace \f2cert_file\fP with the actual file name, as in: 
90ce3da70b43 Initial load
duke
parents:
diff changeset
    99
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   100
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   101
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   102
  keytool \-printcert \-file VScert.cer
90ce3da70b43 Initial load
duke
parents:
diff changeset
   103
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   104
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   105
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   106
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   107
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   108
Option values must be quoted if they contain a blank (space). 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   109
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   110
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   111
The \f2\-help\fP command is the default. Thus, the command line 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   112
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   113
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   114
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   115
  keytool
90ce3da70b43 Initial load
duke
parents:
diff changeset
   116
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   117
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   118
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   119
is equivalent to 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   120
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   121
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   122
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   123
  keytool \-help
90ce3da70b43 Initial load
duke
parents:
diff changeset
   124
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   125
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   126
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   127
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   128
90ce3da70b43 Initial load
duke
parents:
diff changeset
   129
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   130
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   131
Option Defaults
90ce3da70b43 Initial load
duke
parents:
diff changeset
   132
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   133
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   134
90ce3da70b43 Initial load
duke
parents:
diff changeset
   135
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   136
Below are the defaults for various option values. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   137
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   138
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   139
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   140
\-alias "mykey"
90ce3da70b43 Initial load
duke
parents:
diff changeset
   141
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   142
90ce3da70b43 Initial load
duke
parents:
diff changeset
   143
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   144
\-keyalg
90ce3da70b43 Initial load
duke
parents:
diff changeset
   145
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   146
    "DSA" (when using \fP\f3\-genkeypair\fP\f3)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   147
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   148
    "DES" (when using \fP\f3\-genseckey\fP\f3)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   149
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   150
90ce3da70b43 Initial load
duke
parents:
diff changeset
   151
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   152
\-keysize
90ce3da70b43 Initial load
duke
parents:
diff changeset
   153
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   154
    1024 (when using \fP\f3\-genkeypair\fP\f3)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   155
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   156
    56 (when using \fP\f3\-genseckey\fP\f3 and \-keyalg is "DES")
90ce3da70b43 Initial load
duke
parents:
diff changeset
   157
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   158
    168 (when using \fP\f3\-genseckey\fP\f3 and \-keyalg is "DESede")
90ce3da70b43 Initial load
duke
parents:
diff changeset
   159
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   160
90ce3da70b43 Initial load
duke
parents:
diff changeset
   161
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   162
\-validity 90
90ce3da70b43 Initial load
duke
parents:
diff changeset
   163
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   164
90ce3da70b43 Initial load
duke
parents:
diff changeset
   165
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   166
\-keystore \fP\f4the file named \fP\f4.keystore\fP\f3 in the user's home directory\fP\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   167
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   168
90ce3da70b43 Initial load
duke
parents:
diff changeset
   169
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   170
\-storetype \fP\f4the value of the "keystore.type" property in the security properties file,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   171
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   172
           which is returned by the static \fP\f4getDefaultType\fP\f3 method in \fP\f4java.security.KeyStore\fP\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   173
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   174
90ce3da70b43 Initial load
duke
parents:
diff changeset
   175
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   176
\-file \fP\f4stdin if reading, stdout if writing\fP\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   177
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   178
90ce3da70b43 Initial load
duke
parents:
diff changeset
   179
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   180
\-protected false
90ce3da70b43 Initial load
duke
parents:
diff changeset
   181
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   182
90ce3da70b43 Initial load
duke
parents:
diff changeset
   183
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   184
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   185
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   186
90ce3da70b43 Initial load
duke
parents:
diff changeset
   187
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   188
In generating a public/private key pair, the signature algorithm (\f2\-sigalg\fP option) is derived from the algorithm of the underlying private key: If the underlying private key is of type "DSA", the \f2\-sigalg\fP option defaults to "SHA1withDSA", and if the underlying private key is of type "RSA", \f2\-sigalg\fP defaults to "MD5withRSA". Please consult the 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   189
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
   190
\f2Java Cryptography Architecture API Specification & Reference\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
   191
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   192
http://java.sun.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html#AppA for a full list of \f2\-keyalg\fP and \f2\-sigalg\fP you can choose from.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   193
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   194
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   195
Common Options
90ce3da70b43 Initial load
duke
parents:
diff changeset
   196
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   197
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   198
90ce3da70b43 Initial load
duke
parents:
diff changeset
   199
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   200
The \f2\-v\fP option can appear for all commands except \f2\-help\fP. If it appears, it signifies "verbose" mode; more information will be output. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   201
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   202
There is also a \f2\-J\fP\f2javaoption\fP option that may appear for any command. If it appears, the specified \f2javaoption\fP string is passed through directly to the Java interpreter. This option should not contain any spaces. It is useful for adjusting the execution environment or memory usage. For a list of possible interpreter options, type \f2java \-h\fP or \f2java \-X\fP at the command line.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   203
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   204
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   205
These options may appear for all commands operating on a keystore:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   206
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   207
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   208
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   209
\-storetype storetype 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   210
This qualifier specifies the type of keystore to be instantiated. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   211
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   212
\-keystore keystore 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   213
The keystore location. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   214
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   215
If the JKS storetype is used and a keystore file does not yet exist, then certain \f3keytool\fP commands may result in a new keystore file being created. For example, if \f2keytool \-genkeypair\fP is invoked and the \f2\-keystore\fP option is not specified, the default keystore file named \f2.keystore\fP in the user's home directory will be created if it does not already exist. Similarly, if the \f2\-keystore \fP\f2ks_file\fP option is specified but \f2ks_file\fP does not exist, then it will be created 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   216
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   217
Note that the input stream from the \f2\-keystore\fP option is passed to the \f2KeyStore.load\fP method. If \f2NONE\fP is specified as the URL, then a null stream is passed to the \f2KeyStore.load\fP method. \f2NONE\fP should be specified if the \f2KeyStore\fP is not file\-based (for example, if it resides on a hardware token device).  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   218
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   219
\-storepass storepass 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   220
The password which is used to protect the integrity of the keystore. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   221
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   222
\f2storepass\fP must be at least 6 characters long. It must be provided to all commands that access the keystore contents. For such commands, if a \f2\-storepass\fP option is not provided at the command line, the user is prompted for it. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   223
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   224
When retrieving information from the keystore, the password is optional; if no password is given, the integrity of the retrieved information cannot be checked and a warning is displayed.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   225
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   226
\-providerName provider_name 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   227
Used to identify a cryptographic service provider's name when listed in the security properties file. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   228
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   229
\-providerClass provider_class_name 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   230
Used to specify the name of cryptographic service provider's master class file when the service provider is not listed in the security properties file. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   231
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   232
\-providerArg provider_arg 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   233
Used in conjunction with \f2\-providerClass\fP. Represents an optional string input argument for the constructor of \f2provider_class_name\fP. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   234
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   235
\-protected 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   236
Either \f2true\fP or \f2false\fP. This value should be specified as \f2true\fP if a password must be given via a protected authentication path such as a dedicated PIN reader. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   237
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   238
90ce3da70b43 Initial load
duke
parents:
diff changeset
   239
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   240
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   241
.SH "COMMANDS"
90ce3da70b43 Initial load
duke
parents:
diff changeset
   242
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   243
90ce3da70b43 Initial load
duke
parents:
diff changeset
   244
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   245
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   246
Creating or Adding Data to the Keystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   247
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   248
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   249
90ce3da70b43 Initial load
duke
parents:
diff changeset
   250
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   251
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   252
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   253
\-genkeypair {\-alias alias} {\-keyalg keyalg} {\-keysize keysize} {\-sigalg sigalg} [\-dname dname] [\-keypass keypass] {\-validity valDays} {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v} {\-protected} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   254
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   255
Generates a key pair (a public key and associated private key). Wraps the public key into an X.509 v3 self\-signed certificate, which is stored as a single\-element certificate chain. This certificate chain and the private key are stored in a new keystore entry identified by \f2alias\fP. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   256
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   257
\f2keyalg\fP specifies the algorithm to be used to generate the key pair, and \f2keysize\fP specifies the size of each key to be generated. \f2sigalg\fP specifies the algorithm that should be used to sign the self\-signed certificate; this algorithm must be compatible with \f2keyalg\fP. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   258
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   259
\f2dname\fP specifies the X.500 Distinguished Name to be associated with \f2alias\fP, and is used as the \f2issuer\fP and \f2subject\fP fields in the self\-signed certificate. If no distinguished name is provided at the command line, the user will be prompted for one. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   260
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   261
\f2keypass\fP is a password used to protect the private key of the generated key pair. If no password is provided, the user is prompted for it. If you press RETURN at the prompt, the key password is set to the same password as that used for the keystore. \f2keypass\fP must be at least 6 characters long. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   262
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   263
\f2valDays\fP tells the number of days for which the certificate should be considered valid. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   264
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   265
This command was named \f2\-genkey\fP in previous releases. This old name is still supported in this release and will be supported in future releases, but for clarify the new name, \f2\-genkeypair\fP, is preferred going forward.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   266
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   267
\-genseckey {\-alias alias} {\-keyalg keyalg} {\-keysize keysize} [\-keypass keypass] {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v} {\-protected} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   268
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   269
Generates a secret key and stores it in a new \f2KeyStore.SecretKeyEntry\fP identified by \f2alias\fP. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   270
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   271
\f2keyalg\fP specifies the algorithm to be used to generate the secret key, and \f2keysize\fP specifies the size of the key to be generated. \f2keypass\fP is a password used to protect the secret key. If no password is provided, the user is prompted for it. If you press RETURN at the prompt, the key password is set to the same password as that used for the keystore. \f2keypass\fP must be at least 6 characters long.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   272
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   273
\-importcert {\-alias alias} {\-file cert_file} [\-keypass keypass] {\-noprompt} {\-trustcacerts} {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerName provider_name} {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v} {\-protected} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   274
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   275
Reads the certificate or certificate chain (where the latter is supplied in a PKCS#7 formatted reply) from the file \f2cert_file\fP, and stores it in the keystore entry identified by \f2alias\fP. If no file is given, the certificate or PKCS#7 reply is read from stdin. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   276
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   277
\f3keytool\fP can import X.509 v1, v2, and v3 certificates, and PKCS#7 formatted certificate chains consisting of certificates of that type. The data to be imported must be provided either in binary encoding format, or in printable encoding format (also known as Base64 encoding) as defined by the Internet RFC 1421 standard. In the latter case, the encoding must be bounded at the beginning by a string that starts with "\-\-\-\-\-BEGIN", and bounded at the end by a string that starts with "\-\-\-\-\-END". 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   278
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   279
You import a certificate for two reasons: 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   280
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   281
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   282
1.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   283
to add it to the list of trusted certificates, or 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   284
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   285
2.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   286
to import a certificate reply received from a CA as the result of submitting a Certificate Signing Request (see the \-certreq command) to that CA. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   287
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   288
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   289
Which type of import is intended is indicated by the value of the \f2\-alias\fP option: 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   290
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   291
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   292
1.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   293
\f3If the alias does not point to a key entry\fP, then \f3keytool\fP assumes you are adding a trusted certificate entry. In this case, the alias should not already exist in the keystore. If the alias does already exist, then \f3keytool\fP outputs an error, since there is already a trusted certificate for that alias, and does not import the certificate. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   294
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   295
2.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   296
\f3If the alias points to a key entry\fP, then \f3keytool\fP assumes you are importing a certificate reply. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   297
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   298
\f3Importing a New Trusted Certificate\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   299
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   300
90ce3da70b43 Initial load
duke
parents:
diff changeset
   301
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   302
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   303
Before adding the certificate to the keystore, \f3keytool\fP tries to verify it by attempting to construct a chain of trust from that certificate to a self\-signed certificate (belonging to a root CA), using trusted certificates that are already available in the keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   304
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   305
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   306
If the \f2\-trustcacerts\fP option has been specified, additional certificates are considered for the chain of trust, namely the certificates in a file named "cacerts".
90ce3da70b43 Initial load
duke
parents:
diff changeset
   307
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   308
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   309
If \f3keytool\fP fails to establish a trust path from the certificate to be imported up to a self\-signed certificate (either from the keystore or the "cacerts" file), the certificate information is printed out, and the user is prompted to verify it, e.g., by comparing the displayed certificate fingerprints with the fingerprints obtained from some other (trusted) source of information, which might be the certificate owner himself/herself. Be very careful to ensure the certificate is valid prior to importing it as a "trusted" certificate! \-\- see WARNING Regarding Importing Trusted Certificates. The user then has the option of aborting the import operation. If the \f2\-noprompt\fP option is given, however, there will be no interaction with the user.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   310
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   311
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   312
\f3Importing a Certificate Reply\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   313
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   314
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   315
When importing a certificate reply, the certificate reply is validated using trusted certificates from the keystore, and optionally using the certificates configured in the "cacerts" keystore file (if the \f2\-trustcacerts\fP option was specified).
90ce3da70b43 Initial load
duke
parents:
diff changeset
   316
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   317
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   318
The methods of determining whether the certificate reply is trusted are described in the following:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   319
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   320
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   321
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   322
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   323
\f3If the reply is a single X.509 certificate\fP, \f3keytool\fP attempts to establish a trust chain, starting at the certificate reply and ending at a self\-signed certificate (belonging to a root CA). The certificate reply and the hierarchy of certificates used to authenticate the certificate reply form the new certificate chain of \f2alias\fP. If a trust chain cannot be established, the certificate reply is not imported. In this case, \f3keytool\fP does not print out the certificate and prompt the user to verify it, because it is very hard (if not impossible) for a user to determine the authenticity of the certificate reply. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   324
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   325
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   326
\f3If the reply is a PKCS#7 formatted certificate chain\fP, the chain is first ordered (with the user certificate first and the self\-signed root CA certificate last), before \f3keytool\fP attempts to match the root CA certificate provided in the reply with any of the trusted certificates in the keystore or the "cacerts" keystore file (if the \f2\-trustcacerts\fP option was specified). If no match can be found, the information of the root CA certificate is printed out, and the user is prompted to verify it, e.g., by comparing the displayed certificate fingerprints with the fingerprints obtained from some other (trusted) source of information, which might be the root CA itself. The user then has the option of aborting the import operation. If the \f2\-noprompt\fP option is given, however, there will be no interaction with the user. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   327
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   328
90ce3da70b43 Initial load
duke
parents:
diff changeset
   329
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   330
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   331
If the public key in the certificate reply matches the user's public key already stored with under \f2alias\fP, the old certificate chain is replaced with the new certificate chain in the reply. The old chain can only be replaced if a valid \f2keypass\fP, the password used to protect the private key of the entry, is supplied. If no password is provided, and the private key password is different from the keystore password, the user is prompted for it.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   332
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   333
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   334
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   335
This command was named \f2\-import\fP in previous releases. This old name is still supported in this release and will be supported in future releases, but for clarify the new name, \f2\-importcert\fP, is preferred going forward.    
90ce3da70b43 Initial load
duke
parents:
diff changeset
   336
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   337
\-importkeystore \-srckeystore srckeystore \-destkeystore destkeystore {\-srcstoretype srcstoretype} {\-deststoretype deststoretype} [\-srcstorepass srcstorepass] [\-deststorepass deststorepass] {\-srcprotected} {\-destprotected} {\-srcalias srcalias {\-destalias destalias} [\-srckeypass srckeypass] [\-destkeypass destkeypass] } {\-noprompt} {\-srcProviderName src_provider_name} {\-destProviderName dest_provider_name} {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v} {\-protected} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   338
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   339
Imports a single entry or all entries from a source keystore to a destination keystore. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   340
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   341
When the \f2srcalias\fP option is provided, the command imports the single entry identified by the alias to the destination keystore. If a destination alias is not provided with \f2destalias\fP, then \f2srcalias\fP is used as the destination alias. If the source entry is protected by a password, \f2srckeypass\fP will be used to recover the entry. If \f2srckeypass\fP is not provided, then \f3keytool\fP will attempt to use \f2srcstorepass\fP to recover the entry. If \f2srcstorepass\fP is either not provided or is incorrect, the user will be prompted for a password. The destination entry will be protected using \f2destkeypass\fP. If \f2destkeypass\fP is not provided, the destination entry will be protected with the source entry password. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   342
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   343
If the \f2srcalias\fP option is not provided, then all entries in the source keystore are imported into the destination keystore. Each destination entry will be stored under the alias from the source entry. If the source entry is protected by a password, \f2srcstorepass\fP will be used to recover the entry. If \f2srcstorepass\fP is either not provided or is incorrect, the user will be prompted for a password. If a source keystore entry type is not supported in the destination keystore, or if an error occurs while storing an entry into the destination keystore, the user will be prompted whether to skip the entry and continue, or to quit. The destination entry will be protected with the source entry password. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   344
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   345
If the destination alias already exists in the destination keystore, the user is prompted to either overwrite the entry, or to create a new entry under a different alias name. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   346
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   347
Note that if \f2\-noprompt\fP is provided, the user will not be prompted for a new destination alias. Existing entries will automatically be overwritten with the destination alias name. Finally, entries that can not be imported are automatically skipped and a warning is output.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   348
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   349
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   350
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   351
Exporting Data
90ce3da70b43 Initial load
duke
parents:
diff changeset
   352
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   353
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   354
90ce3da70b43 Initial load
duke
parents:
diff changeset
   355
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   356
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   357
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   358
\-certreq {\-alias alias} {\-sigalg sigalg} {\-file certreq_file} [\-keypass keypass] {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerName provider_name} {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v} {\-protected} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   359
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   360
Generates a Certificate Signing Request (CSR), using the PKCS#10 format. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   361
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   362
A CSR is intended to be sent to a certificate authority (CA). The CA will authenticate the certificate requestor (usually off\-line) and will return a certificate or certificate chain, used to replace the existing certificate chain (which initially consists of a self\-signed certificate) in the keystore. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   363
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   364
The private key and X.500 Distinguished Name associated with \f2alias\fP are used to create the PKCS#10 certificate request. In order to access the private key, the appropriate password must be provided, since private keys are protected in the keystore with a password. If \f2keypass\fP is not provided at the command line, and is different from the password used to protect the integrity of the keystore, the user is prompted for it. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   365
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   366
\f2sigalg\fP specifies the algorithm that should be used to sign the CSR. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   367
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   368
The CSR is stored in the file \f2certreq_file\fP. If no file is given, the CSR is output to stdout. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   369
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   370
Use the \f2importcert\fP command to import the response from the CA.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   371
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   372
\-exportcert {\-alias alias} {\-file cert_file} {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerName provider_name} {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-rfc} {\-v} {\-protected} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   373
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   374
Reads (from the keystore) the certificate associated with \f2alias\fP, and stores it in the file \f2cert_file\fP. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   375
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   376
If no file is given, the certificate is output to stdout. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   377
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   378
The certificate is by default output in binary encoding, but will instead be output in the printable encoding format, as defined by the Internet RFC 1421 standard, if the \f2\-rfc\fP option is specified. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   379
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   380
If \f2alias\fP refers to a trusted certificate, that certificate is output. Otherwise, \f2alias\fP refers to a key entry with an associated certificate chain. In that case, the first certificate in the chain is returned. This certificate authenticates the public key of the entity addressed by \f2alias\fP. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   381
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   382
This command was named \f2\-export\fP in previous releases. This old name is still supported in this release and will be supported in future releases, but for clarify the new name, \f2\-exportcert\fP, is preferred going forward.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   383
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   384
90ce3da70b43 Initial load
duke
parents:
diff changeset
   385
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   386
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   387
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   388
Displaying Data
90ce3da70b43 Initial load
duke
parents:
diff changeset
   389
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   390
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   391
90ce3da70b43 Initial load
duke
parents:
diff changeset
   392
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   393
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   394
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   395
\-list {\-alias alias} {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerName provider_name} {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v | \-rfc} {\-protected} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   396
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   397
Prints (to stdout) the contents of the keystore entry identified by \f2alias\fP. If no alias is specified, the contents of the entire keystore are printed. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   398
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   399
This command by default prints the MD5 fingerprint of a certificate. If the \f2\-v\fP option is specified, the certificate is printed in human\-readable format, with additional information such as the owner, issuer, serial number, and any extensions. If the \f2\-rfc\fP option is specified, certificate contents are printed using the printable encoding format, as defined by the Internet RFC 1421 standard 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   400
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   401
You cannot specify both \f2\-v\fP and \f2\-rfc\fP.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   402
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   403
\-printcert {\-file cert_file} {\-v} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   404
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   405
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   406
Internet RFC 1421 standard. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   407
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   408
Note: This option can be used independently of a keystore.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   409
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   410
90ce3da70b43 Initial load
duke
parents:
diff changeset
   411
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   412
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   413
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   414
Managing the Keystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   415
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   416
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   417
90ce3da70b43 Initial load
duke
parents:
diff changeset
   418
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   419
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   420
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   421
\-storepasswd [\-new new_storepass] {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerName provider_name} {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   422
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   423
Changes the password used to protect the integrity of the keystore contents. The new password is \f2new_storepass\fP, which must be at least 6 characters long.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   424
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   425
\-keypasswd {\-alias alias} [\-keypass old_keypass] [\-new new_keypass] {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerName provider_name} {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   426
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   427
Changes the password under which the private/secret key identified by \f2alias\fP is protected, from \f2old_keypass\fP to \f2new_keypass\fP, which must be at least 6 characters long. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   428
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   429
If the \f2\-keypass\fP option is not provided at the command line, and the key password is different from the keystore password, the user is prompted for it. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   430
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   431
If the \f2\-new\fP option is not provided at the command line, the user is prompted for it.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   432
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   433
\-delete [\-alias alias] {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerName provider_name} {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v} {\-protected} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   434
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   435
Deletes from the keystore the entry identified by \f2alias\fP. The user is prompted for the alias, if no alias is provided at the command line.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   436
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   437
\-changealias {\-alias alias} [\-destalias destalias] [\-keypass keypass] {\-storetype storetype} {\-keystore keystore} [\-storepass storepass] {\-providerName provider_name} {\-providerClass provider_class_name {\-providerArg provider_arg}} {\-v} {\-protected} {\-Jjavaoption} 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   438
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   439
Move an existing keystore entry from the specified \f2alias\fP to a new alias, \f2destalias\fP. If no destination alias is provided, the command will prompt for one. If the original entry is protected with an entry password, the password can be supplied via the "\-keypass" option. If no key password is provided, the \f2storepass\fP (if given) will be attempted first. If that attempt fails, the user will be prompted for a password.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   440
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   441
90ce3da70b43 Initial load
duke
parents:
diff changeset
   442
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   443
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   444
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   445
Getting Help
90ce3da70b43 Initial load
duke
parents:
diff changeset
   446
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   447
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   448
90ce3da70b43 Initial load
duke
parents:
diff changeset
   449
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   450
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   451
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   452
\-help 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   453
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   454
Lists the basic commands and their options.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   455
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   456
90ce3da70b43 Initial load
duke
parents:
diff changeset
   457
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   458
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   459
.SH "EXAMPLES"
90ce3da70b43 Initial load
duke
parents:
diff changeset
   460
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   461
90ce3da70b43 Initial load
duke
parents:
diff changeset
   462
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   463
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   464
Suppose you want to create a keystore for managing your public/private key pair and certificates from entities you trust.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   465
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   466
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   467
Generating Your Key Pair
90ce3da70b43 Initial load
duke
parents:
diff changeset
   468
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   469
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   470
90ce3da70b43 Initial load
duke
parents:
diff changeset
   471
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   472
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   473
The first thing you need to do is create a keystore and generate the key pair. You could use a command such as the following:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   474
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   475
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   476
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   477
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   478
    keytool \-genkeypair \-dname "cn=Mark Jones, ou=JavaSoft, o=Sun, c=US"
90ce3da70b43 Initial load
duke
parents:
diff changeset
   479
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   480
      \-alias business \-keypass kpi135 \-keystore /working/mykeystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   481
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   482
      \-storepass ab987c \-validity 180
90ce3da70b43 Initial load
duke
parents:
diff changeset
   483
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   484
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   485
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   486
90ce3da70b43 Initial load
duke
parents:
diff changeset
   487
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   488
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   489
(Please note: This must be typed as a single line. Multiple lines are used in the examples just for legibility purposes.)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   490
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   491
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   492
This command creates the keystore named "mykeystore" in the "working" directory (assuming it doesn't already exist), and assigns it the password "ab987c". It generates a public/private key pair for the entity whose "distinguished name" has a common name of "Mark Jones", organizational unit of "JavaSoft", organization of "Sun" and two\-letter country code of "US". It uses the default "DSA" key generation algorithm to create the keys, both 1024 bits long.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   493
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   494
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   495
It creates a self\-signed certificate (using the default "SHA1withDSA" signature algorithm) that includes the public key and the distinguished name information. This certificate will be valid for 180 days, and is associated with the private key in a keystore entry referred to by the alias "business". The private key is assigned the password "kpi135".
90ce3da70b43 Initial load
duke
parents:
diff changeset
   496
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   497
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   498
The command could be significantly shorter if option defaults were accepted. As a matter of fact, no options are required; defaults are used for unspecified options that have default values, and you are prompted for any required values. Thus, you could simply have the following:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   499
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   500
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   501
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   502
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   503
    keytool \-genkeypair
90ce3da70b43 Initial load
duke
parents:
diff changeset
   504
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   505
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   506
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   507
90ce3da70b43 Initial load
duke
parents:
diff changeset
   508
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   509
In this case, a keystore entry with alias "mykey" is created, with a newly\-generated key pair and a certificate that is valid for 90 days. This entry is placed in the keystore named ".keystore" in your home directory. (The keystore is created if it doesn't already exist.) You will be prompted for the distinguished name information, the keystore password, and the private key password. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   510
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   511
The rest of the examples assume you executed the \f2\-genkeypair\fP command without options specified, and that you responded to the prompts with values equal to those given in the first \f2\-genkeypair\fP command, above (a private key password of "kpi135", etc.)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   512
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   513
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   514
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   515
Requesting a Signed Certificate from a Certification Authority
90ce3da70b43 Initial load
duke
parents:
diff changeset
   516
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   517
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   518
90ce3da70b43 Initial load
duke
parents:
diff changeset
   519
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   520
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   521
So far all we've got is a self\-signed certificate. A certificate is more likely to be trusted by others if it is signed by a Certification Authority (CA). To get such a signature, you first generate a Certificate Signing Request (CSR), via the following:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   522
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   523
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   524
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   525
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   526
    keytool \-certreq \-file MarkJ.csr
90ce3da70b43 Initial load
duke
parents:
diff changeset
   527
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   528
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   529
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   530
90ce3da70b43 Initial load
duke
parents:
diff changeset
   531
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   532
This creates a CSR (for the entity identified by the default alias "mykey") and puts the request in the file named "MarkJ.csr". Submit this file to a CA, such as VeriSign, Inc. The CA will authenticate you, the requestor (usually off\-line), and then will return a certificate, signed by them, authenticating your public key. (In some cases, they will actually return a chain of certificates, each one authenticating the public key of the signer of the previous certificate in the chain.)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   533
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   534
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   535
Importing a Certificate for the CA
90ce3da70b43 Initial load
duke
parents:
diff changeset
   536
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   537
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   538
90ce3da70b43 Initial load
duke
parents:
diff changeset
   539
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   540
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   541
You need to replace your self\-signed certificate with a certificate chain, where each certificate in the chain authenticates the public key of the signer of the previous certificate in the chain, up to a "root" CA.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   542
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   543
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   544
Before you import the certificate reply from a CA, you need one or more "trusted certificates" in your keystore or in the \f2cacerts\fP keystore file (which is described in importcert command):
90ce3da70b43 Initial load
duke
parents:
diff changeset
   545
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   546
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   547
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   548
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   549
If the certificate reply is a certificate chain, you just need the top certificate of the chain (that is, the "root" CA certificate authenticating that CA's public key). 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   550
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   551
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   552
If the certificate reply is a single certificate, you need a certificate for the issuing CA (the one that signed it), and if that certificate is not self\-signed, you need a certificate for its signer, and so on, up to a self\-signed "root" CA certificate. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   553
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   554
90ce3da70b43 Initial load
duke
parents:
diff changeset
   555
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   556
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   557
The "cacerts" keystore file ships with five VeriSign root CA certificates, so you probably won't need to import a VeriSign certificate as a trusted certificate in your keystore. But if you request a signed certificate from a different CA, and a certificate authenticating that CA's public key hasn't been added to "cacerts", you will need to import a certificate from the CA as a "trusted certificate".
90ce3da70b43 Initial load
duke
parents:
diff changeset
   558
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   559
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   560
A certificate from a CA is usually either self\-signed, or signed by another CA (in which case you also need a certificate authenticating that CA's public key). Suppose company ABC, Inc., is a CA, and you obtain a file named "ABCCA.cer" that is purportedly a self\-signed certificate from ABC, authenticating that CA's public key.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   561
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   562
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   563
Be very careful to ensure the certificate is valid prior to importing it as a "trusted" certificate! View it first (using the \f3keytool\fP \f2\-printcert\fP command, or the \f3keytool\fP \f2\-importcert\fP command without the \f2\-noprompt\fP option), and make sure that the displayed certificate fingerprint(s) match the expected ones. You can call the person who sent the certificate, and compare the fingerprint(s) that you see with the ones that they show (or that a secure public key repository shows). Only if the fingerprints are equal is it guaranteed that the certificate has not been replaced in transit with somebody else's (for example, an attacker's) certificate. If such an attack took place, and you did not check the certificate before you imported it, you would end up trusting anything the attacker has signed.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   564
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   565
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   566
If you trust that the certificate is valid, then you can add it to your keystore via the following:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   567
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   568
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   569
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   570
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   571
    keytool \-importcert \-alias abc \-file ABCCA.cer
90ce3da70b43 Initial load
duke
parents:
diff changeset
   572
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   573
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   574
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   575
90ce3da70b43 Initial load
duke
parents:
diff changeset
   576
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   577
This creates a "trusted certificate" entry in the keystore, with the data from the file "ABCCA.cer", and assigns the alias "abc" to the entry.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   578
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   579
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   580
Importing the Certificate Reply from the CA
90ce3da70b43 Initial load
duke
parents:
diff changeset
   581
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   582
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   583
90ce3da70b43 Initial load
duke
parents:
diff changeset
   584
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   585
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   586
Once you've imported a certificate authenticating the public key of the CA you submitted your certificate signing request to (or there's already such a certificate in the "cacerts" file), you can import the certificate reply and thereby replace your self\-signed certificate with a certificate chain. This chain is the one returned by the CA in response to your request (if the CA reply is a chain), or one constructed (if the CA reply is a single certificate) using the certificate reply and trusted certificates that are already available in the keystore where you import the reply or in the "cacerts" keystore file.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   587
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   588
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   589
For example, suppose you sent your certificate signing request to VeriSign. You can then import the reply via the following, which assumes the returned certificate is named "VSMarkJ.cer":
90ce3da70b43 Initial load
duke
parents:
diff changeset
   590
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   591
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   592
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   593
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   594
    keytool \-importcert \-trustcacerts \-file VSMarkJ.cer
90ce3da70b43 Initial load
duke
parents:
diff changeset
   595
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   596
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   597
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   598
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   599
90ce3da70b43 Initial load
duke
parents:
diff changeset
   600
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   601
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   602
Exporting a Certificate Authenticating Your Public Key
90ce3da70b43 Initial load
duke
parents:
diff changeset
   603
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   604
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   605
90ce3da70b43 Initial load
duke
parents:
diff changeset
   606
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   607
Suppose you have used the 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   608
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
   609
\f2jarsigner\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
   610
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   611
http://java.sun.com/javase/6/docs/tooldocs/solaris/jarsigner.html tool to sign a Java ARchive (JAR) file. Clients that want to use the file will want to authenticate your signature. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   612
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   613
One way they can do this is by first importing your public key certificate into their keystore as a "trusted" entry. You can export the certificate and supply it to your clients. As an example, you can copy your certificate to a file named \f2MJ.cer\fP via the following, assuming the entry is aliased by "mykey":
90ce3da70b43 Initial load
duke
parents:
diff changeset
   614
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   615
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   616
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   617
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   618
    keytool \-exportcert \-alias mykey \-file MJ.cer
90ce3da70b43 Initial load
duke
parents:
diff changeset
   619
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   620
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   621
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   622
90ce3da70b43 Initial load
duke
parents:
diff changeset
   623
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   624
Given that certificate, and the signed JAR file, a client can use the \f3jarsigner\fP tool to authenticate your signature.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   625
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   626
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   627
Importing Keystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   628
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   629
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   630
90ce3da70b43 Initial load
duke
parents:
diff changeset
   631
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   632
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   633
The command "importkeystore" is used to import an entire keystore into another keystore, which means all entries from the source keystore, including keys and certificates, are all imported to the destination keystore within a single command. You can use this command to import entries from a different type of keystore. During the import, all new entries in the destination keystore will have the same alias names and protection passwords (for secret keys and private keys). If \f3keytool\fP has difficulties recover the private keys or secret keys from the source keystore, it will prompt you for a password. If it detects alias duplication, it will ask you for a new one, you can specify a new alias or simply allow \f3keytool\fP to overwrite the existing one.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   634
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   635
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   636
For example, to import entries from a normal JKS type keystore key.jks into a PKCS #11 type hardware based keystore, you can use the command:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   637
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   638
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   639
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   640
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   641
keytool \-importkeystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   642
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   643
    \-srckeystore key.jks \-destkeystore NONE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   644
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   645
    \-srcstoretype JKS \-deststoretype PKCS11
90ce3da70b43 Initial load
duke
parents:
diff changeset
   646
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   647
    \-srcstorepass changeit \-deststorepass topsecret
90ce3da70b43 Initial load
duke
parents:
diff changeset
   648
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   649
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   650
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   651
90ce3da70b43 Initial load
duke
parents:
diff changeset
   652
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   653
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   654
The importkeystore command can also be used to import a single entry from a source keystore to a destination keystore. In this case, besides the options you see in the above example, you need to specify the alias you want to import. With the srcalias option given, you can also specify the desination alias name in the command line, as well as protection password for a secret/private key and the destination protection password you want. In this way, you can issue a \f3keytool\fP command that will never ask you a question. This makes it very convenient to include a \f3keytool\fP command into a script file, like this:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   655
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   656
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   657
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   658
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   659
keytool \-importkeystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   660
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   661
    \-srckeystore key.jks \-destkeystore NONE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   662
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   663
    \-srcstoretype JKS \-deststoretype PKCS11
90ce3da70b43 Initial load
duke
parents:
diff changeset
   664
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   665
    \-srcstorepass changeit \-deststorepass topsecret
90ce3da70b43 Initial load
duke
parents:
diff changeset
   666
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   667
    \-srcalias myprivatekey \-destalias myoldprivatekey
90ce3da70b43 Initial load
duke
parents:
diff changeset
   668
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   669
    \-srckeypass oldkeypass \-destkeypass mynewkeypass
90ce3da70b43 Initial load
duke
parents:
diff changeset
   670
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   671
    \-noprompt
90ce3da70b43 Initial load
duke
parents:
diff changeset
   672
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   673
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   674
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   675
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   676
90ce3da70b43 Initial load
duke
parents:
diff changeset
   677
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   678
.SH "TERMINOLOGY and WARNINGS"
90ce3da70b43 Initial load
duke
parents:
diff changeset
   679
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   680
90ce3da70b43 Initial load
duke
parents:
diff changeset
   681
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   682
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   683
KeyStore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   684
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   685
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   686
90ce3da70b43 Initial load
duke
parents:
diff changeset
   687
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   688
A keystore is a storage facility for cryptographic keys and certificates.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   689
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   690
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   691
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   692
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   693
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   694
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   695
\f3KeyStore Entries\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   696
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   697
90ce3da70b43 Initial load
duke
parents:
diff changeset
   698
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   699
Keystores may have different types of entries. The two most applicable entry types for \f3keytool\fP include: 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   700
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   701
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   702
1.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   703
\f3key entries\fP \- each holds very sensitive cryptographic key information, which is stored in a protected format to prevent unauthorized access. Typically, a key stored in this type of entry is a secret key, or a private key accompanied by the certificate "chain" for the corresponding public key. The \f3keytool\fP can handle both types od entry, while \f3jarsigner\fP tool only handle the latter type of entry, that is private keys and their associated certificate chains. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   704
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   705
2.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   706
\f3trusted certificate entries\fP \- each contains a single public key certificate belonging to another party. It is called a "trusted certificate" because the keystore owner trusts that the public key in the certificate indeed belongs to the identity identified by the "subject" (owner) of the certificate. The issuer of the certificate vouches for this, by signing the certificate. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   707
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   708
90ce3da70b43 Initial load
duke
parents:
diff changeset
   709
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   710
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   711
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   712
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   713
\f3KeyStore Aliases\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   714
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   715
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   716
All keystore entries (key and trusted certificate entries) are accessed via unique \f2aliases\fP.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   717
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   718
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   719
An alias is specified when you add an entity to the keystore using the \-genseckey command to generate a secret key, \-genkeypair command to generate a key pair (public and private key) or the \-importcert command to add a certificate or certificate chain to the list of trusted certificates. Subsequent \f3keytool\fP commands must use this same alias to refer to the entity.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   720
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   721
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   722
For example, suppose you use the alias \f2duke\fP to generate a new public/private key pair and wrap the public key into a self\-signed certificate (see Certificate Chains) via the following command:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   723
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   724
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   725
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   726
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   727
    keytool \-genkeypair \-alias duke \-keypass dukekeypasswd
90ce3da70b43 Initial load
duke
parents:
diff changeset
   728
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   729
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   730
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   731
90ce3da70b43 Initial load
duke
parents:
diff changeset
   732
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   733
This specifies an inital password of "dukekeypasswd" required by subsequent commands to access the private key assocated with the alias \f2duke\fP. If you later want to change duke's private key password, you use a command like the following: 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   734
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   735
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   736
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   737
    keytool \-keypasswd \-alias duke \-keypass dukekeypasswd \-new newpass
90ce3da70b43 Initial load
duke
parents:
diff changeset
   738
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   739
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   740
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   741
90ce3da70b43 Initial load
duke
parents:
diff changeset
   742
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   743
This changes the password from "dukekeypasswd" to "newpass". 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   744
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   745
Please note: A password should not actually be specified on a command line or in a script unless it is for testing purposes, or you are on a secure system. If you don't specify a required password option on a command line, you will be prompted for it.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   746
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   747
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   748
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   749
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   750
\f3KeyStore Implementation\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   751
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   752
The \f2KeyStore\fP class provided in the \f2java.security\fP package supplies well\-defined interfaces to access and modify the information in a keystore. It is possible for there to be multiple different concrete implementations, where each implementation is that for a particular \f2type\fP of keystore. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   753
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   754
Currently, two command\-line tools (\f3keytool\fP and \f3jarsigner\fP) and a GUI\-based tool named \f3Policy Tool\fP make use of keystore implementations. Since \f2KeyStore\fP is publicly available, users can write additional security applications that use it.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   755
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   756
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   757
There is a built\-in default implementation, provided by Sun Microsystems. It implements the keystore as a file, utilizing a proprietary keystore type (format) named "JKS". It protects each private key with its individual password, and also protects the integrity of the entire keystore with a (possibly different) password.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   758
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   759
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   760
Keystore implementations are provider\-based. More specifically, the application interfaces supplied by \f2KeyStore\fP are implemented in terms of a "Service Provider Interface" (SPI). That is, there is a corresponding abstract \f2KeystoreSpi\fP class, also in the \f2java.security\fP package, which defines the Service Provider Interface methods that "providers" must implement. (The term "provider" refers to a package or a set of packages that supply a concrete implementation of a subset of services that can be accessed by the Java Security API.) Thus, to provide a keystore implementation, clients must implement a "provider" and supply a KeystoreSpi subclass implementation, as described in How to Implement a Provider for the Java Cryptography Architecture.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   761
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   762
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   763
Applications can choose different \f2types\fP of keystore implementations from different providers, using the "getInstance" factory method supplied in the \f2KeyStore\fP class. A keystore type defines the storage and data format of the keystore information, and the algorithms used to protect private/secret keys in the keystore and the integrity of the keystore itself. Keystore implementations of different types are not compatible.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   764
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   765
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   766
\f3keytool\fP works on any file\-based keystore implementation. (It treats the keytore location that is passed to it at the command line as a filename and converts it to a FileInputStream, from which it loads the keystore information.) The \f3jarsigner\fP and \f3policytool\fP tools, on the other hand, can read a keystore from any location that can be specified using a URL.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   767
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   768
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   769
For \f3keytool\fP and \f3jarsigner\fP, you can specify a keystore type at the command line, via the \f2\-storetype\fP option. For \f3Policy Tool\fP, you can specify a keystore type via the "Keystore" menu.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   770
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   771
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   772
If you don't explicitly specify a keystore type, the tools choose a keystore implementation based simply on the value of the \f2keystore.type\fP property specified in the security properties file. The security properties file is called \f2java.security\fP, and it resides in the security properties directory, \f2java.home\fP/lib/security, where \f2java.home\fP is the runtime environment's directory (the \f2jre\fP directory in the SDK or the top\-level directory of the Java 2 Runtime Environment).
90ce3da70b43 Initial load
duke
parents:
diff changeset
   773
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   774
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   775
Each tool gets the \f2keystore.type\fP value and then examines all the currently\-installed providers until it finds one that implements keystores of that type. It then uses the keystore implementation from that provider.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   776
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   777
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   778
The \f2KeyStore\fP class defines a static method named \f2getDefaultType\fP that lets applications and applets retrieve the value of the \f2keystore.type\fP property. The following line of code creates an instance of the default keystore type (as specified in the \f2keystore.type\fP property):
90ce3da70b43 Initial load
duke
parents:
diff changeset
   779
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   780
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   781
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   782
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   783
    KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());
90ce3da70b43 Initial load
duke
parents:
diff changeset
   784
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   785
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   786
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   787
90ce3da70b43 Initial load
duke
parents:
diff changeset
   788
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   789
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   790
The default keystore type is "jks" (the proprietary type of the keystore implementation provided by Sun). This is specified by the following line in the security properties file:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   791
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   792
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   793
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   794
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   795
    keystore.type=jks
90ce3da70b43 Initial load
duke
parents:
diff changeset
   796
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   797
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   798
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   799
90ce3da70b43 Initial load
duke
parents:
diff changeset
   800
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   801
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   802
To have the tools utilize a keystore implementation other than the default, you can change that line to specify a different keystore type.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   803
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   804
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   805
For example, if you have a provider package that supplies a keystore implementation for a keystore type called "pkcs12", change the line to
90ce3da70b43 Initial load
duke
parents:
diff changeset
   806
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   807
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   808
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   809
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   810
    keystore.type=pkcs12
90ce3da70b43 Initial load
duke
parents:
diff changeset
   811
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   812
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   813
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   814
90ce3da70b43 Initial load
duke
parents:
diff changeset
   815
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   816
Note: case doesn't matter in keystore type designations. For example, "JKS" would be considered the same as "jks".
90ce3da70b43 Initial load
duke
parents:
diff changeset
   817
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   818
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   819
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   820
Certificate
90ce3da70b43 Initial load
duke
parents:
diff changeset
   821
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   822
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   823
90ce3da70b43 Initial load
duke
parents:
diff changeset
   824
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   825
A \f3certificate\fP (also known as a \f3public\-key certificate\fP) is a digitally signed statement from one entity (the \f2issuer\fP), saying that the public key (and some other information) of another entity (the \f2subject\fP) has some specific value.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   826
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   827
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   828
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   829
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   830
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   831
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   832
\f3Certificate Terms\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   833
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   834
90ce3da70b43 Initial load
duke
parents:
diff changeset
   835
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   836
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   837
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   838
Public Keys 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   839
These are numbers associated with a particular entity, and are intended to be known to everyone who needs to have trusted interactions with that entity. Public keys are used to verify signatures. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   840
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   841
Digitally Signed 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   842
If some data is \f2digitally signed\fP it has been stored with the "identity" of an entity, and a signature that proves that entity knows about the data. The data is rendered unforgeable by signing with the entity's private key. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   843
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   844
Identity 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   845
A known way of addressing an entity. In some systems the identity is the public key, in others it can be anything from a Unix UID to an Email address to an X.509 Distinguished Name. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   846
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   847
Signature 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   848
A signature is computed over some data using the private key of an entity (the \f2signer\fP, which in the case of a certificate is also known as the \f2issuer\fP). 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   849
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   850
Private Keys 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   851
These are numbers, each of which is supposed to be known only to the particular entity whose private key it is (that is, it's supposed to be kept secret). Private and public keys exist in pairs in all public key cryptography systems (also referred to as "public key crypto systems"). In a typical public key crypto system, such as DSA, a private key corresponds to exactly one public key. Private keys are used to compute signatures. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   852
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   853
Entity 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   854
An entity is a person, organization, program, computer, business, bank, or something else you are trusting to some degree. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   855
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   856
90ce3da70b43 Initial load
duke
parents:
diff changeset
   857
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   858
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   859
Basically, public key cryptography requires access to users' public keys. In a large\-scale networked environment it is impossible to guarantee that prior relationships between communicating entities have been established or that a trusted repository exists with all used public keys. Certificates were invented as a solution to this public key distribution problem. Now a \f2Certification Authority\fP (CA) can act as a trusted third party. CAs are entities (for example, businesses) that are trusted to sign (issue) certificates for other entities. It is assumed that CAs will only create valid and reliable certificates, as they are bound by legal agreements. There are many public Certification Authorities, such as 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   860
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
   861
\f2VeriSign\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
   862
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   863
http://www.verisign.com/, 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   864
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
   865
\f2Thawte\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
   866
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   867
http://www.thawte.com/, 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   868
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
   869
\f2Entrust\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
   870
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   871
http://www.entrust.com/, and so on. You can also run your own Certification Authority using products such as the Netscape/Microsoft Certificate Servers or the Entrust CA product for your organization.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   872
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   873
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   874
Using \f3keytool\fP, it is possible to display, import, and export certificates. It is also possible to generate self\-signed certificates.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   875
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   876
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   877
\f3keytool\fP currently handles X.509 certificates.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   878
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   879
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   880
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   881
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   882
\f3X.509 Certificates\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   883
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   884
The X.509 standard defines what information can go into a certificate, and describes how to write it down (the data format). All the data in a certificate is encoded using two related standards called ASN.1/DER. \f2Abstract Syntax Notation 1\fP describes data. The \f2Definite Encoding Rules\fP describe a single way to store and transfer that data. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   885
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   886
All X.509 certificates have the following data, in addition to the signature:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   887
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   888
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   889
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   890
Version 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   891
This identifies which version of the X.509 standard applies to this certificate, which affects what information can be specified in it. Thus far, three versions are defined. \f3keytool\fP can import and export v1, v2, and v3 certificates. It generates v3 certificates. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   892
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   893
\f2X.509 Version 1\fP has been available since 1988, is widely deployed, and is the most generic. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   894
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   895
\f2X.509 Version 2\fP introduced the concept of subject and issuer unique identifiers to handle the possibility of reuse of subject and/or issuer names over time. Most certificate profile documents strongly recommend that names not be reused, and that certificates should not make use of unique identifiers. Version 2 certificates are not widely used. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   896
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   897
\f2X.509 Version 3\fP is the most recent (1996) and supports the notion of extensions, whereby anyone can define an extension and include it in the certificate. Some common extensions in use today are: \f2KeyUsage\fP (limits the use of the keys to particular purposes such as "signing\-only") and \f2AlternativeNames\fP (allows other identities to also be associated with this public key, e.g. DNS names, Email addresses, IP addresses). Extensions can be marked \f2critical\fP to indicate that the extension should be checked and enforced/used. For example, if a certificate has the KeyUsage extension marked critical and set to "keyCertSign" then if this certificate is presented during SSL communication, it should be rejected, as the certificate extension indicates that the associated private key should only be used for signing certificates and not for SSL use.  
90ce3da70b43 Initial load
duke
parents:
diff changeset
   898
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   899
Serial Number 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   900
The entity that created the certificate is responsible for assigning it a serial number to distinguish it from other certificates it issues. This information is used in numerous ways, for example when a certificate is revoked its serial number is placed in a Certificate Revocation List (CRL). 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   901
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   902
Signature Algorithm Identifier 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   903
This identifies the algorithm used by the CA to sign the certificate. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   904
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   905
Issuer Name 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   906
The X.500 Distinguished Name of the entity that signed the certificate. This is normally a CA. Using this certificate implies trusting the entity that signed this certificate. (Note that in some cases, such as \f2root or top\-level\fP CA certificates, the issuer signs its own certificate.) 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   907
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   908
Validity Period 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   909
Each certificate is valid only for a limited amount of time. This period is described by a start date and time and an end date and time, and can be as short as a few seconds or almost as long as a century. The validity period chosen depends on a number of factors, such as the strength of the private key used to sign the certificate or the amount one is willing to pay for a certificate. This is the expected period that entities can rely on the public value, if the associated private key has not been compromised. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   910
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   911
Subject Name 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   912
The name of the entity whose public key the certificate identifies. This name uses the X.500 standard, so it is intended to be unique across the Internet. This is the X.500 Distinguished Name (DN) of the entity, for example, 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   913
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
   914
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   915
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   916
    CN=Java Duke, OU=Java Software Division, O=Sun Microsystems Inc, C=US
90ce3da70b43 Initial load
duke
parents:
diff changeset
   917
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
   918
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   919
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
   920
(These refer to the subject's Common Name, Organizational Unit, Organization, and Country.) 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   921
.TP 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   922
Subject Public Key Information 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   923
This is the public key of the entity being named, together with an algorithm identifier which specifies which public key crypto system this key belongs to and any associated key parameters. 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   924
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   925
90ce3da70b43 Initial load
duke
parents:
diff changeset
   926
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   927
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   928
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   929
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   930
\f3Certificate Chains\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   931
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   932
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   933
\f3keytool\fP can create and manage keystore "key" entries that each contain a private key and an associated certificate "chain". The first certificate in the chain contains the public key corresponding to the private key.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   934
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   935
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   936
When keys are first generated (see the \-genkeypair command), the chain starts off containing a single element, a \f2self\-signed certificate\fP. A self\-signed certificate is one for which the issuer (signer) is the same as the subject (the entity whose public key is being authenticated by the certificate). Whenever the \f2\-genkeypair\fP command is called to generate a new public/private key pair, it also wraps the public key into a self\-signed certificate.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   937
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   938
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   939
Later, after a Certificate Signing Request (CSR) has been generated (see the \-certreq command) and sent to a Certification Authority (CA), the response from the CA is imported (see \-importcert), and the self\-signed certificate is replaced by a chain of certificates. At the bottom of the chain is the certificate (reply) issued by the CA authenticating the subject's public key. The next certificate in the chain is one that authenticates the \f2CA\fP's public key.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   940
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   941
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   942
In many cases, this is a self\-signed certificate (that is, a certificate from the CA authenticating its own public key) and the last certificate in the chain. In other cases, the CA may return a chain of certificates. In this case, the bottom certificate in the chain is the same (a certificate signed by the CA, authenticating the public key of the key entry), but the second certificate in the chain is a certificate signed by a \f2different\fP CA, authenticating the public key of the CA you sent the CSR to. Then, the next certificate in the chain will be a certificate authenticating the second CA's key, and so on, until a self\-signed "root" certificate is reached. Each certificate in the chain (after the first) thus authenticates the public key of the signer of the previous certificate in the chain.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   943
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   944
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   945
Many CAs only return the issued certificate, with no supporting chain, especially when there is a flat hierarchy (no intermediates CAs). In this case, the certificate chain must be established from trusted certificate information already stored in the keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   946
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   947
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   948
A different reply format (defined by the PKCS#7 standard) also includes the supporting certificate chain, in addition to the issued certificate. Both reply formats can be handled by \f3keytool\fP.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   949
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   950
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   951
The top\-level (root) CA certificate is self\-signed. However, the trust into the root's public key does not come from the root certificate itself (anybody could generate a self\-signed certificate with the distinguished name of say, the VeriSign root CA!), but from other sources like a newspaper. The root CA public key is widely known. The only reason it is stored in a certificate is because this is the format understood by most tools, so the certificate in this case is only used as a "vehicle" to transport the root CA's public key. Before you add the root CA certificate to your keystore, you should view it (using the \f2\-printcert\fP option) and compare the displayed fingerprint with the well\-known fingerprint (obtained from a newspaper, the root CA's webpage, etc.).
90ce3da70b43 Initial load
duke
parents:
diff changeset
   952
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   953
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
   954
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   955
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
   956
\f3The cacerts Certificates File\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   957
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   958
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   959
A certificates file named \f3"cacerts"\fP resides in the security properties directory, \f2java.home\fP/lib/security, where \f2java.home\fP is the runtime environment's directory (the \f2jre\fP directory in the SDK or the top\-level directory of the Java 2 Runtime Environment).
90ce3da70b43 Initial load
duke
parents:
diff changeset
   960
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   961
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   962
The "cacerts" file represents a system\-wide keystore with CA certificates. System administrators can configure and manage that file using \f3keytool\fP, specifying "jks" as the keystore type. The "cacerts" keystore file ships with several root CA certificates with the following aliases and X.500 owner distinguished names:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   963
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   964
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   965
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   966
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   967
\f3Alias\fP: thawtepersonalfreemailca
90ce3da70b43 Initial load
duke
parents:
diff changeset
   968
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   969
\f3Owner DN\fP: EmailAddress=personal\-freemail@thawte.com,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   970
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   971
CN=Thawte Personal Freemail CA,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   972
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   973
OU=Certification Services Division,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   974
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   975
O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   976
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   977
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   978
\f3Alias\fP: thawtepersonalbasicca
90ce3da70b43 Initial load
duke
parents:
diff changeset
   979
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   980
\f3Owner DN\fP: EmailAddress=personal\-basic@thawte.com,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   981
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   982
CN=Thawte Personal Basic CA,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   983
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   984
OU=Certification Services Division,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   985
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   986
O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   987
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   988
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   989
\f3Alias\fP: thawtepersonalpremiumca
90ce3da70b43 Initial load
duke
parents:
diff changeset
   990
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   991
\f3Owner DN\fP: EmailAddress=personal\-premium@thawte.com,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   992
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   993
CN=Thawte Personal Premium CA,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   994
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   995
OU=Certification Services Division,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   996
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
   997
O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA 
90ce3da70b43 Initial load
duke
parents:
diff changeset
   998
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   999
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1000
\f3Alias\fP: thawteserverca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1001
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1002
\f3Owner DN\fP: EmailAddress=server\-certs@thawte.com,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1003
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1004
CN=Thawte Server CA, OU=Certification Services Division,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1005
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1006
O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1007
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1008
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1009
\f3Alias\fP: thawtepremiumserverca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1010
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1011
\f3Owner DN\fP: EmailAddress=premium\-server@thawte.com,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1012
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1013
CN=Thawte Premium Server CA,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1014
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1015
OU=Certification Services Division,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1016
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1017
O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1018
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1019
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1020
\f3Alias\fP: verisignclass1ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1021
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1022
\f3Owner DN\fP: OU=Class 1 Public Primary Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1023
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1024
O="VeriSign, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1025
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1026
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1027
\f3Alias\fP: verisignclass2ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1028
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1029
\f3Owner DN\fP: OU=Class 2 Public Primary Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1030
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1031
O="VeriSign, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1032
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1033
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1034
\f3Alias\fP: verisignclass3ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1035
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1036
\f3Owner DN\fP: OU=Class 3 Public Primary Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1037
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1038
O="VeriSign, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1039
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1040
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1041
\f3Alias\fP: verisignserverca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1042
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1043
\f3Owner DN\fP: OU=Secure Server Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1044
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1045
O="RSA Data Security, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1046
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1047
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1048
\f3Alias\fP: verisignclass1g2ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1049
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1050
\f3Owner DN\fP: OU=VeriSign Trust Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1051
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1052
OU="(c) 1998 VeriSign, Inc. \- For authorized use only",
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1053
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1054
OU=Class 1 Public Primary Certification Authority \- G2,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1055
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1056
O="VeriSign, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1057
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1058
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1059
\f3Alias\fP: verisignclass1g3ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1060
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1061
\f3Owner DN\fP: CN=VeriSign Class 1 Public Primary Certification Authority \- G3, OU="(c) 1999 VeriSign, Inc. \- For authorized use only",
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1062
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1063
OU=VeriSign Trust Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1064
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1065
O="VeriSign, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1066
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1067
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1068
\f3Alias\fP: verisignclass2g2ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1069
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1070
\f3Owner DN\fP: OU=VeriSign Trust Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1071
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1072
OU="(c) 1998 VeriSign, Inc. \- For authorized use only",
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1073
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1074
OU=Class 2 Public Primary Certification Authority \- G2,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1075
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1076
O="VeriSign, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1077
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1078
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1079
\f3Alias\fP: verisignclass2g3ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1080
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1081
\f3Owner DN\fP: CN=VeriSign Class 2 Public Primary Certification Authority \- G3,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1082
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1083
OU="(c) 1999 VeriSign, Inc. \- For authorized use only",
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1084
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1085
OU=VeriSign Trust Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1086
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1087
O="VeriSign, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1088
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1089
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1090
\f3Alias\fP: verisignclass3g2ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1091
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1092
\f3Owner DN\fP: OU=VeriSign Trust Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1093
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1094
OU="(c) 1998 VeriSign, Inc. \- For authorized use only",
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1095
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1096
OU=Class 3 Public Primary Certification Authority \- G2,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1097
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1098
O="VeriSign, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1099
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1100
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1101
\f3Alias\fP: verisignclass3g3ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1102
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1103
\f3Owner DN\fP: CN=VeriSign Class 3 Public Primary Certification Authority \- G3,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1104
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1105
OU="(c) 1999 VeriSign, Inc. \- For authorized use only",
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1106
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1107
OU=VeriSign Trust Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1108
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1109
O="VeriSign, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1110
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1111
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1112
\f3Alias\fP: baltimorecodesigningca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1113
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1114
\f3Owner DN\fP: CN=Baltimore CyberTrust Code Signing Root,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1115
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1116
OU=CyberTrust, O=Baltimore, C=IE 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1117
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1118
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1119
\f3Alias\fP: gtecybertrustglobalca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1120
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1121
\f3Owner DN\fP: CN=GTE CyberTrust Global Root,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1122
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1123
OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1124
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1125
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1126
\f3Alias\fP: baltimorecybertrustca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1127
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1128
\f3Owner DN\fP: CN=Baltimore CyberTrust Root,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1129
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1130
OU=CyberTrust, O=Baltimore, C=IE 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1131
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1132
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1133
\f3Alias\fP: gtecybertrustca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1134
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1135
\f3Owner DN\fP: CN=GTE CyberTrust Root,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1136
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1137
O=GTE Corporation, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1138
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1139
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1140
\f3Alias\fP: gtecybertrust5ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1141
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1142
\f3Owner DN\fP: CN=GTE CyberTrust Root 5,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1143
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1144
OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1145
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1146
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1147
\f3Alias\fP: entrustclientca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1148
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1149
\f3Owner DN\fP: CN=Entrust.net Client Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1150
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1151
OU=(c) 1999 Entrust.net Limited,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1152
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1153
OU=www.entrust.net/Client_CA_Info/CPS incorp. by ref. limits liab.,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1154
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1155
O=Entrust.net, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1156
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1157
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1158
\f3Alias\fP: entrustglobalclientca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1159
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1160
\f3Owner DN\fP: CN=Entrust.net Client Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1161
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1162
OU=(c) 2000 Entrust.net Limited,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1163
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1164
OU=www.entrust.net/GCCA_CPS incorp. by ref. (limits liab.),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1165
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1166
O=Entrust.net 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1167
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1168
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1169
\f3Alias\fP: entrust2048ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1170
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1171
\f3Owner DN\fP: CN=Entrust.net Certification Authority (2048),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1172
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1173
OU=(c) 1999 Entrust.net Limited,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1174
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1175
OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1176
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1177
O=Entrust.net 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1178
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1179
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1180
\f3Alias\fP: entrustsslca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1181
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1182
\f3Owner DN\fP: CN=Entrust.net Secure Server Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1183
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1184
OU=(c) 1999 Entrust.net Limited,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1185
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1186
OU=www.entrust.net/CPS incorp. by ref. (limits liab.),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1187
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1188
O=Entrust.net, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1189
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1190
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1191
\f3Alias\fP: entrustgsslca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1192
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1193
\f3Owner DN\fP: CN=Entrust.net Secure Server Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1194
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1195
OU=(c) 2000 Entrust.net Limited,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1196
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1197
OU=www.entrust.net/SSL_CPS incorp. by ref. (limits liab.),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1198
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1199
O=Entrust.net 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1200
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1201
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1202
\f3Alias\fP: godaddyclass2ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1203
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1204
\f3Owner DN\fP: OU=Go Daddy Class 2 Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1205
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1206
O="The Go Daddy Group, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1207
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1208
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1209
\f3Alias\fP: starfieldclass2ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1210
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1211
\f3Owner DN\fP: OU=Starfield Class 2 Certification Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1212
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1213
O="Starfield Technologies, Inc.", C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1214
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1215
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1216
\f3Alias\fP: valicertclass2ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1217
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1218
\f3Owner DN\fP: EMAILADDRESS=info@valicert.com,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1219
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1220
CN=http://www.valicert.com/,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1221
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1222
OU=ValiCert Class 2 Policy Validation Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1223
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1224
O="ValiCert, Inc.", L=ValiCert Validation Network 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1225
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1226
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1227
\f3Alias\fP: geotrustglobalca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1228
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1229
\f3Owner DN\fP: CN=GeoTrust Global CA,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1230
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1231
O=GeoTrust Inc., C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1232
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1233
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1234
\f3Alias\fP: equifaxsecureca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1235
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1236
\f3Owner DN\fP: OU=Equifax Secure Certificate Authority,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1237
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1238
O=Equifax, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1239
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1240
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1241
\f3Alias\fP: equifaxsecureebusinessca1
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1242
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1243
\f3Owner DN\fP: CN=Equifax Secure eBusiness CA\-1,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1244
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1245
O=Equifax Secure Inc., C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1246
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1247
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1248
\f3Alias\fP: equifaxsecureebusinessca2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1249
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1250
\f3Owner DN\fP: OU=Equifax Secure eBusiness CA\-2,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1251
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1252
O=Equifax Secure, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1253
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1254
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1255
\f3Alias\fP: equifaxsecureglobalebusinessca1
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1256
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1257
\f3Owner DN\fP: CN=Equifax Secure Global eBusiness CA\-1,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1258
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1259
O=Equifax Secure Inc., C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1260
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1261
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1262
\f3Alias\fP: soneraclass1ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1263
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1264
\f3Owner DN\fP: CN=Sonera Class1 CA, O=Sonera, C=FI 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1265
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1266
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1267
\f3Alias\fP: soneraclass2ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1268
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1269
\f3Owner DN\fP: CN=Sonera Class2 CA, O=Sonera, C=FI 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1270
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1271
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1272
\f3Alias\fP: comodoaaaca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1273
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1274
\f3Owner DN\fP: CN=AAA Certificate Services,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1275
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1276
O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1277
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1278
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1279
\f3Alias\fP: addtrustclass1ca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1280
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1281
\f3Owner DN\fP: CN=AddTrust Class 1 CA Root,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1282
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1283
OU=AddTrust TTP Network, O=AddTrust AB, C=SE 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1284
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1285
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1286
\f3Alias\fP: addtrustexternalca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1287
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1288
\f3Owner DN\fP: CN=AddTrust External CA Root,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1289
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1290
OU=AddTrust External TTP Network, O=AddTrust AB, C=SE 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1291
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1292
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1293
\f3Alias\fP: addtrustqualifiedca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1294
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1295
\f3Owner DN\fP: CN=AddTrust Qualified CA Root,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1296
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1297
OU=AddTrust TTP Network, O=AddTrust AB, C=SE 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1298
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1299
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1300
\f3Alias\fP: utnuserfirsthardwareca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1301
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1302
\f3Owner DN\fP: CN=UTN\-USERFirst\-Hardware,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1303
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1304
OU=http://www.usertrust.com, O=The USERTRUST Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1305
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1306
L=Salt Lake City, ST=UT, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1307
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1308
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1309
\f3Alias\fP: utnuserfirstclientauthemailca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1310
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1311
\f3Owner DN\fP: CN=UTN\-USERFirst\-Client Authentication and Email,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1312
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1313
OU=http://www.usertrust.com, O=The USERTRUST Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1314
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1315
L=Salt Lake City, ST=UT, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1316
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1317
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1318
\f3Alias\fP: utndatacorpsgcca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1319
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1320
\f3Owner DN\fP: CN=UTN \- DATACorp SGC,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1321
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1322
OU=http://www.usertrust.com, O=The USERTRUST Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1323
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1324
L=Salt Lake City, ST=UT, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1325
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1326
*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1327
\f3Alias\fP: utnuserfirstobjectca
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1328
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1329
\f3Owner DN\fP: CN=UTN\-USERFirst\-Object,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1330
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1331
OU=http://www.usertrust.com, O=The USERTRUST Network,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1332
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1333
L=Salt Lake City, ST=UT, C=US 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1334
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1335
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1336
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1337
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1338
The initial password of the "cacerts" keystore file is "changeit". System administrators should change that password and the default access permission of that file upon installing the SDK.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1339
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1340
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1341
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1342
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1343
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1344
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1345
\f3IMPORTANT: Verify Your \fP\f4cacerts\fP\f3 File\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1346
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1347
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1348
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1349
Since you trust the CAs in the \f2cacerts\fP file as entities for signing and issuing certificates to other entities, you must manage the \f2cacerts\fP file carefully. The \f2cacerts\fP file should contain only certificates of the CAs you trust. It is your responsibility to verify the trusted root CA certificates bundled in the \f2cacerts\fP file and make your own trust decisions. To remove an untrusted CA certificate from the \f2cacerts\fP file, use the delete option of the \f2keytool\fP command. You can find the \f2cacerts\fP file in the JRE installation directory. Contact your system administrator if you do not have permission to edit this file.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1350
.br
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1351
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1352
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1353
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1354
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1355
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1356
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1357
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1358
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1359
\f3The Internet RFC 1421 Certificate Encoding Standard\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1360
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1361
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1362
Certificates are often stored using the printable encoding format defined by the Internet RFC 1421 standard, instead of their binary encoding. This certificate format, also known as "Base 64 encoding", facilitates exporting certificates to other applications by email or through some other mechanism.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1363
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1364
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1365
Certificates read by the \f2\-importcert\fP and \f2\-printcert\fP commands can be in either this format or binary encoded.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1366
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1367
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1368
The \f2\-exportcert\fP command by default outputs a certificate in binary encoding, but will instead output a certificate in the printable encoding format, if the \f2\-rfc\fP option is specified.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1369
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1370
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1371
The \f2\-list\fP command by default prints the MD5 fingerprint of a certificate. If the \f2\-v\fP option is specified, the certificate is printed in human\-readable format, while if the \f2\-rfc\fP option is specified, the certificate is output in the printable encoding format.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1372
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1373
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1374
In its printable encoding format, the encoded certificate is bounded at the beginning by
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1375
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1376
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1377
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1378
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1379
\-\-\-\-\-BEGIN CERTIFICATE\-\-\-\-\-
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1380
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1381
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1382
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1383
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1384
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1385
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1386
and at the end by
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1387
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1388
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1389
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1390
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1391
\-\-\-\-\-END CERTIFICATE\-\-\-\-\-
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1392
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1393
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1394
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1395
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1396
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1397
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1398
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1399
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1400
X.500 Distinguished Names
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1401
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1402
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1403
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1404
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1405
X.500 Distinguished Names are used to identify entities, such as those which are named by the \f2subject\fP and \f2issuer\fP (signer) fields of X.509 certificates. \f3keytool\fP supports the following subparts: 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1406
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1407
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1408
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1409
\f2commonName\fP \- common name of a person, e.g., "Susan Jones" 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1410
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1411
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1412
\f2organizationUnit\fP \- small organization (e.g, department or division) name, e.g., "Purchasing" 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1413
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1414
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1415
\f2organizationName\fP \- large organization name, e.g., "ABCSystems, Inc." 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1416
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1417
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1418
\f2localityName\fP \- locality (city) name, e.g., "Palo Alto" 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1419
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1420
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1421
\f2stateName\fP \- state or province name, e.g., "California" 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1422
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1423
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1424
\f2country\fP \- two\-letter country code, e.g., "CH" 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1425
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1426
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1427
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1428
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1429
When supplying a distinguished name string as the value of a \f2\-dname\fP option, as for the \f2\-genkeypair\fP  command, the string must be in the following format:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1430
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1431
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1432
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1433
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1434
CN=\fP\f4cName\fP\f3, OU=\fP\f4orgUnit\fP\f3, O=\fP\f4org\fP\f3, L=\fP\f4city\fP\f3, S=\fP\f4state\fP\f3, C=\fP\f4countryCode\fP\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1435
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1436
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1437
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1438
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1439
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1440
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1441
where all the italicized items represent actual values and the above keywords are abbreviations for the following:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1442
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1443
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1444
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1445
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1446
       CN=commonName
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1447
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1448
        OU=organizationUnit
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1449
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1450
        O=organizationName
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1451
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1452
        L=localityName
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1453
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1454
        S=stateName
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1455
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1456
        C=country
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1457
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1458
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1459
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1460
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1461
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1462
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1463
A sample distinguished name string is
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1464
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1465
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1466
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1467
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1468
CN=Mark Smith, OU=JavaSoft, O=Sun, L=Cupertino, S=California, C=US
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1469
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1470
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1471
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1472
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1473
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1474
and a sample command using such a string is 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1475
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1476
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1477
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1478
keytool \-genkeypair \-dname "CN=Mark Smith, OU=JavaSoft, O=Sun, L=Cupertino,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1479
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1480
S=California, C=US" \-alias mark
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1481
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1482
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1483
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1484
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1485
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1486
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1487
Case does not matter for the keyword abbreviations. For example, "CN", "cn", and "Cn" are all treated the same.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1488
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1489
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1490
Order matters; each subcomponent must appear in the designated order. However, it is not necessary to have all the subcomponents. You may use a subset, for example:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1491
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1492
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1493
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1494
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1495
CN=Steve Meier, OU=SunSoft, O=Sun, C=US
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1496
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1497
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1498
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1499
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1500
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1501
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1502
If a distinguished name string value contains a comma, the comma must be escaped by a "\\" character when you specify the string on a command line, as in
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1503
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1504
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1505
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1506
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1507
   cn=peter schuster, o=Sun Microsystems\\, Inc., o=sun, c=us
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1508
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1509
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1510
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1511
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1512
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1513
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1514
It is never necessary to specify a distinguished name string on a command line. If it is needed for a command, but not supplied on the command line, the user is prompted for each of the subcomponents. In this case, a comma does not need to be escaped by a "\\".
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1515
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1516
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1517
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1518
WARNING Regarding Importing Trusted Certificates
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1519
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1520
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1521
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1522
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1523
IMPORTANT: Be sure to check a certificate very carefully before importing it as a trusted certificate! 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1524
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1525
View it first (using the \f2\-printcert\fP command, or the \f2\-importcert\fP command without the \f2\-noprompt\fP option), and make sure that the displayed certificate fingerprint(s) match the expected ones. For example, suppose someone sends or emails you a certificate, and you put it in a file named \f2/tmp/cert\fP. Before you consider adding the certificate to your list of trusted certificates, you can execute a \f2\-printcert\fP command to view its fingerprints, as in
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1526
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1527
.nf
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1528
\f3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1529
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1530
  keytool \-printcert \-file /tmp/cert
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1531
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1532
    Owner: CN=ll, OU=ll, O=ll, L=ll, S=ll, C=ll
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1533
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1534
    Issuer: CN=ll, OU=ll, O=ll, L=ll, S=ll, C=ll
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1535
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1536
    Serial Number: 59092b34
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1537
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1538
    Valid from: Thu Sep 25 18:01:13 PDT 1997 until: Wed Dec 24 17:01:13 PST 1997
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1539
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1540
    Certificate Fingerprints:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1541
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1542
         MD5:  11:81:AD:92:C8:E5:0E:A2:01:2E:D4:7A:D7:5F:07:6F
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1543
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1544
         SHA1: 20:B6:17:FA:EF:E5:55:8A:D0:71:1F:E8:D6:9D:C0:37:13:0E:5E:FE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1545
.fl
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1546
\fP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1547
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1548
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1549
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1550
Then call or otherwise contact the person who sent the certificate, and compare the fingerprint(s) that you see with the ones that they show. Only if the fingerprints are equal is it guaranteed that the certificate has not been replaced in transit with somebody else's (for example, an attacker's) certificate. If such an attack took place, and you did not check the certificate before you imported it, you would end up trusting anything the attacker has signed (for example, a JAR file with malicious class files inside). 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1551
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1552
Note: it is not required that you execute a \f2\-printcert\fP command prior to importing a certificate, since before adding a certificate to the list of trusted certificates in the keystore, the \f2\-importcert\fP command prints out the certificate information and prompts you to verify it. You then have the option of aborting the import operation. Note, however, this is only the case if you invoke the \f2\-importcert\fP command without the \f2\-noprompt\fP option. If the \f2\-noprompt\fP option is given, there is no interaction with the user.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1553
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1554
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1555
.SS 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1556
Warning Regarding Passwords
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1557
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1558
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1559
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1560
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1561
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1562
Most commands operating on a keystore require the store password. Some commands require a private/secret key password.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1563
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1564
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1565
Passwords can be specified on the command line (in the \f2\-storepass\fP and \f2\-keypass\fP options, respectively). However, a password should not be specified on a command line or in a script unless it is for testing purposes, or you are on a secure system.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1566
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1567
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1568
If you don't specify a required password option on a command line, you will be prompted for it.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1569
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1570
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1571
.SH "SEE ALSO"
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1572
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1573
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1574
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1575
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1576
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1577
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1578
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1579
\f2jar\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1580
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1581
http://java.sun.com/javase/6/docs/tooldocs/solaris/jar.html tool documentation 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1582
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1583
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1584
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1585
\f2jarsigner\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1586
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1587
http://java.sun.com/javase/6/docs/tooldocs/solaris/jarsigner.html tool documentation 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1588
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1589
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1590
the 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1591
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1592
\f4Security\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1593
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1594
http://java.sun.com/docs/books/tutorial/security/index.html trail of the 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1595
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1596
\f4Java Tutorial\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1597
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1598
http://java.sun.com/docs/books/tutorial/trailmap.html for examples of the use of \f3keytool\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1599
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1600
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1601
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1602
.SH "CHANGES"
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1603
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1604
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1605
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1606
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1607
The command interface for keytool changed in Java SE 6.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1608
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1609
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1610
\f3keytool\fP no longer displays password input when entered by users. Since password input can no longer be viewed when entered, users will be prompted to re\-enter passwords any time a password is being set or changed (for example, when setting the initial keystore password, or when changing a key password).
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1611
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1612
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1613
Some commands have simply been renamed, and other commands deemed obsolete are no longer listed in this document. All previous commands (both renamed and obsolete) are still supported in this release and will continue to be supported in future releases. The following summarizes all of the changes made to the keytool command interface:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1614
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1615
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1616
Renamed commands:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1617
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1618
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1619
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1620
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1621
\f2\-export\fP, renamed to \f2\-exportcert\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1622
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1623
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1624
\f2\-genkey\fP, renamed to \f2\-genkeypair\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1625
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1626
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1627
\f2\-import\fP, renamed to \f2\-importcert\fP 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1628
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1629
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1630
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1631
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1632
Commands deemed obsolete and no longer documented:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1633
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1634
.RS 3
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1635
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1636
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1637
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1638
\f2\-keyclone\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1639
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1640
http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/keytool.html#keycloneCmd 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1641
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1642
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1643
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1644
\f2\-identitydb\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1645
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1646
http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/keytool.html#identitydbCmd 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1647
.TP 2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1648
o
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1649
.na
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1650
\f2\-selfcert\fP @
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1651
.fi
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1652
http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/keytool.html#selfcertCmd 
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1653
.RE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1654
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1655
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1656
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1657
.LP
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1658