Hi Felix, I had the same issue days before, I solved by doing this:

In any directory ( I use my root ) enter the command:

1.keytool -genkey -alias tomcat -keyalg RSA
 
Enter keystore password:  changeit
 What is your first and last name?
 [Unknown]:  localhost
 What is the name of your organizational unit?
 [Unknown]:
 What is the name of your organization?
 [Unknown]:
 What is the name of your City or Locality?
 [Unknown]:
 What is the name of your State or Province?
 [Unknown]:
 What is the two-letter country code for this unit?
 [Unknown]:
 Is CN=localhost, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=Unknown 
correct?
 [no]: yes

-------------------------------------------------------------------------------------------
Then enter the command:

2.keytool -export -alias tomcat -keypass changeit -file %FILE_NAME%

I use server.cert for %FILE_NAME%. This command exports the cert you generated 
from your personal keystore (In windows your personal keystore is in 
C:\Documents and Settings\<username>\.keystore)


3. Finally import the cert into Java's keystore with this command. Tomcat uses 
the keystore in your JRE (%JAVA_HOME%/jre/lib/security/cacerts) or other 
cacerts you use, for exmple the JRE eclipse use /etc/java-6-sun/security/cacerts

keytool -import -alias tomcat -file %FILE_NAME% -keypass changeit -keystore 
%JAVA_HOME%/jre/lib/security/cacerts

****%FILE_NAME% =  server.cert for example

P.D. *delete existing alias in keytool: keytool -delete -alias tomcat -keyalg 
RSA)

I Hope that can help you!

Best regards
-- 
You are currently subscribed to [email protected] as: 
[email protected]
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-user

Reply via email to