Hi Felix, I had the same issue days before, I solved by doing this: In any directory ( I use my root ) enter the command:
1.keytool -genkey -alias tomcat -keyalg RSA Enter keystore password: changeit What is your first and last name? [Unknown]: localhost What is the name of your organizational unit? [Unknown]: What is the name of your organization? [Unknown]: What is the name of your City or Locality? [Unknown]: What is the name of your State or Province? [Unknown]: What is the two-letter country code for this unit? [Unknown]: Is CN=localhost, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=Unknown correct? [no]: yes ------------------------------------------------------------------------------------------- Then enter the command: 2.keytool -export -alias tomcat -keypass changeit -file %FILE_NAME% I use server.cert for %FILE_NAME%. This command exports the cert you generated from your personal keystore (In windows your personal keystore is in C:\Documents and Settings\<username>\.keystore) 3. Finally import the cert into Java's keystore with this command. Tomcat uses the keystore in your JRE (%JAVA_HOME%/jre/lib/security/cacerts) or other cacerts you use, for exmple the JRE eclipse use /etc/java-6-sun/security/cacerts keytool -import -alias tomcat -file %FILE_NAME% -keypass changeit -keystore %JAVA_HOME%/jre/lib/security/cacerts ****%FILE_NAME% = server.cert for example P.D. *delete existing alias in keytool: keytool -delete -alias tomcat -keyalg RSA) I Hope that can help you! Best regards -- You are currently subscribed to [email protected] as: [email protected] To unsubscribe, change settings or access archives, see http://www.ja-sig.org/wiki/display/JSG/cas-user
