To have an SSL “handshake” with the server, you must generate the truststore from the certificate used by the server.
Before you begin
Make sure your system administrator has followed the directions in the
TIBCO Spotfire Statistics Services Administration Guide for installing the certificate.
About this task
You can perform these steps on the either server and copy the truststore to all machines that will run the client, or you can perform the steps directly on the machines that will run the client.
Procedure
-
At a command prompt, type the following (where drive is the location for your keystore and keystore.cer is the server certificate you got from your server administrator):
keytool -import -keystore drive:/truststore -alias tomcat -file drive:/keystore.cer
-
Provide a keystore password. For example:
mypassword
Your output should resemble the following:
Owner: CN=usercomputername, OU=UserComany, O=UserCompany, L=City, ST=WA, C=US
Issuer: CN=usercomputername, OU=UserComany, O=UserCompany, L=City, ST=WA, C=US
Serial number: 78e2951
Valid from: Tues Feb 3 1:10:16 PDT 2015 until: Wed Sept 14 10:10:26 PST 2015
Certificate fingerprints:
MD5: 38:B2:41:FD:4D:3A:34:26:13:0C:34:3C:A6:51:66:EA
SHA1: CA:3B:A9:9A:87:8B:A1:E6:E5:73:07:89:33:D0:B6:17:20:67:66:8A
-
Provide the value yes when the system asks if you trust the certificate:
Trust this certificate? [no]: yes
Results
Certificate is added to the keystore.