Yes. 

Sent from my iPhone

> On Mar 26, 2015, at 12:53, Gianluca Diodato <gianluca.diod...@gmail.com> 
> wrote:
> 
> Hi Dmitriy,
> I have created my certificate with xca gui and export into a file .crt with 
> PEM format.
> And now? I have to import this file in my keystore for change Tomcat?
> 
> Best
> Gianluca
> 
> Il giorno mercoledì 25 marzo 2015 15:51:35 UTC+1, Dmitriy Kopylenko ha 
> scritto:
>> 
>> I just want to add that there is an excellent GUI software for managing all 
>> of this stuff (built on OpenSSL), namely xca: 
>> http://sourceforge.net/projects/xca/
>> 
>> Best,
>> D.
>> 
>>> On Mar 25, 2015, at 10:42 AM, Waldbieser, Carl <wald...@lafayette.edu> 
>>> wrote:
>>> 
>>> Gianluca,
>>> 
>>> This site [1] has useful `keytool` examples.  You should be able to view 
>>> the contents of your keystore with something like:
>>> 
>>>  $ keytool -l -v -keystore /path/to/your/keystore.jks
>>> 
>>> There are some useful troubleshooting tips on SO [2].
>>> 
>>> To configure Tomcat to use the keystore, you need to set up a connector 
>>> like the following in $CATALINA_HOME/conf/server.xml:
>>> 
>>>    <Connector 
>>>        protocol="org.apache.coyote.http11.Http11Protocol"
>>>        
>>> SSLImplementation="edu.internet2.middleware.security.tomcat6.DelegateToApplicationJSSEImplementation"
>>>        port="443"
>>>        scheme="https"
>>>        secure="true"
>>>        clientAuth="false"
>>>        SSLEnabled="true"
>>>        emptySessionPath="true"
>>>        sslProtocol="TLS"
>>>        keystoreFile="/path/to/your/keystore.jks"
>>>        keystorePass="YourKeystorePassword"
>>>        truststoreFile="/path/to/your/keystore.jks"
>>>        truststorePass="YourKeystorePassword"
>>>        truststoreAlgorithm="DelegateToApplication"
>>>    />
>>> 
>>> The exact parameters may vary a bit depending on your version of Tomcat or 
>>> other preferences you may have.
>>> 
>>> 
>>> [1] 
>>> https://www.sslshopper.com/article-most-common-java-keytool-keystore-commands.html
>>> [2] 
>>> http://stackoverflow.com/questions/2138940/import-pem-into-java-key-store
>>> 
>>> Thanks,
>>> Carl
>>> 
>>> ----- Original Message -----
>>> From: "Gianluca Diodato" <gianluca...@gmail.com>
>>> To: jasig-c...@googlegroups.com
>>> Cc: cas-...@lists.jasig.org, cas-...@lists.jasig.org, 
>>> cas-...@lists.jasig.org, wald...@lafayette.edu
>>> Sent: Wednesday, March 25, 2015 10:21:05 AM
>>> Subject: Re: [cas-user] SSL problem (I need tutorial!!) Cas Server on 
>>> remote machine , Java Cas Client other machine
>>> 
>>> Carl,
>>> thank you very much for detailed answer.
>>> I'm in until 4)... I have created this files:
>>> - casserver.crt
>>> - casserver.key
>>> - casserver.csr
>>> - rootCA.pem
>>> - rootCA.key
>>> - rootCA.srl
>>> 
>>> In 5) I have to install the private key and public certificate in my CAS 
>>> server using java `keytool` (i don't know how... ) and configuring Tomcat 
>>> to use the keystore I created( i'm in!!).
>>> It is this the instruction? keytool -import -trustcacerts -alias *mydomain* 
>>> -file *mydomain.crt* -keystore 
>>> 
>>> *keystore.jks*Thanks
>>> Gianluca
>>> 
>>> Il giorno mercoledì 25 marzo 2015 14:21:07 UTC+1, Waldbieser, Carl ha 
>>> scritto:
>>>> 
>>>> Gianluca, 
>>>> 
>>>> For development, I like to use the openssl tools to create my own CA and 
>>>> use it to sign my own certificates rather than using a self-signed 
>>>> certificate. 
>>>> Here are the notes I use.  Lines starting with ($) are the actual commands 
>>>> I enter into the terminal. 
>>>> 
>>>> ================ 
>>>> Create My Own CA 
>>>> ================ 
>>>> 
>>>> # Create CA key 
>>>> $ openssl genrsa -des3 -out rootCA.key 2048 
>>>> # Create and self-sign CA cert. 
>>>> $ openssl req -x509 -new -nodes -key rootCA.key -days 1024 -out rootCA.pem 
>>>> 
>>>> ------------ 
>>>> Create a Key 
>>>> ------------ 
>>>> $ openssl genrsa -out example.key 2048 
>>>> 
>>>> ------------------------------------ 
>>>> Create a Certificate Signing Request 
>>>> ------------------------------------ 
>>>> $ openssl req -new -key example.key -out example.csr 
>>>> 
>>>> ---------- 
>>>> Sign a CSR 
>>>> ---------- 
>>>> openssl x509 -req -in example.csr -CA rootCA.pem -CAkey rootCA.key 
>>>> -CAcreateserial -out example.crt -days 500 
>>>> 
>>>> 
>>>> So first, I generate a CA key and cert (first 2 commands).  This is 
>>>> something you only need to do once, but you have to keep the key somewhere 
>>>> you can find it, and you need to remember the password you choose for it 
>>>> as 
>>>> you will use this key to sign your certs. 
>>>> 
>>>> Next, whenever you set up a develoment *server*, you create a private key 
>>>> for the server (command under "Create a Key" section) and a certificate 
>>>> signing request (section "Create a certificate signing request). 
>>>> 
>>>> Finally, you use the CA you generated to sign the CSR and generate a 
>>>> public certificate for the server (section "Sign a CSR").  These steps are 
>>>> basically what real CAs do, but they need to be a lot more careful with 
>>>> their keys and their CA public certs are typically already included in 
>>>> your 
>>>> browser. 
>>>> 
>>>> It is worth noting that the OpenSSL tool commands above generate keys and 
>>>> certs in PEM format, which is a text format you can view in an editor.  
>>>> The 
>>>> CAS server runs as a Java servlet, so it uses a Java keystore format (a 
>>>> file that sometimes has a .jks extension).  You need to use the Java 
>>>> `keytool` command to import certificates and private keys into the Java 
>>>> keystore. 
>>>> 
>>>> Browsers will typically accept certificates in a variety of formats. 
>>>> 
>>>> So for your CAS setup, I would: 
>>>> 
>>>>  1) Generate a CA key and certificate. 
>>>>  2) Generate a private key for my CAS server. 
>>>>  3) Generate a CSR for the CAS server private key. 
>>>>  4) Use my CA key to sign the CAS server CSR and create a public 
>>>> certificate. 
>>>>  5) Install the private key and public certificate in my CAS server using 
>>>> java `keytool` and configuring Tomcat to use the keystore I created. 
>>>>     Alternatively, if I have Apache in front of Tomcat and am using 
>>>> something like mod_ajp, I can just use the PEM files in my Apache config 
>>>>     and not worry about SSL in Tomcat. 
>>>>  6) Import my CA public cert into my browser. 
>>>>  7) Test that the CAS server cert is accepted by my browser (hit the 
>>>> /logout URL and verify the cert gives me the "green lock" icon). 
>>>>  8) Repeat steps 2-5 for my server with the CAS client app. 
>>>>  9) Since the CAS client app is actually going to make an HTTPS request 
>>>> to CAS using a back-channel, you have to make sure that the 
>>>>     HTTPS Java client it uses trusts your CA.  I am not sure how to 
>>>> configure this *specifically* for only that client, but I believe 
>>>>     you can import your CA into the system-wide Java CA-certs keystore. 
>>>> Its name is typically "cacerts", but the location on your 
>>>>     system may vary. 
>>>> 
>>>> Thanks, 
>>>> Carl 
>>>> 
>>>> ----- Original Message ----- 
>>>> From: "Gianluca Diodato" <gianluca...@gmail.com <javascript:>> 
>>>> To: jasig-c...@googlegroups.com <javascript:> 
>>>> Cc: cas-...@lists.jasig.org <javascript:>, cas-...@lists.jasig.org 
>>>> <javascript:>, wald...@lafayette.edu <javascript:> 
>>>> Sent: Wednesday, March 25, 2015 6:24:44 AM 
>>>> Subject: Re: [cas-user] SSL problem (I need tutorial!!) Cas Server on 
>>>> remote machine , Java Cas Client other machine 
>>>> 
>>>> Hi Carl, 
>>>> thanks to your answer. 
>>>> First of all, yes it is a development environment. 
>>>> I create my own CA into server machine (CAS Server) with this tutorial 
>>>> (http://tekyhost.com/ubuntu-12-04-and-tomcat-7-ssl-implementation/) and 
>>>> everything works fine (https://localhost:8443/cas/login and on other 
>>>> mychine https://my_ip_server:8443/cas/login). I follows this 
>>>> tutorial http://jasig.github.io/cas/4.0.x/index.html and for the 
>>>> authentication i create a db (mySQL) with a table users (2 columns: email, 
>>>> password(MD5)). In the other machine I'm developing a web application 
>>>> (J2EE 
>>>> in Eclipse) and I'm searching to connect login page to cas login page via 
>>>> web.xml adding filters 
>>>> (https://cuit.columbia.edu/cas-ify-java-application) 
>>>> 
>>>> via SSL. 
>>>> For my client machine, have I to create another own CA or have I to import 
>>>> server CA into  $JAVA_HOME/jre/lib/security/cacerts (client)?? 
>>>> Sorry but all this is new for me!! 
>>>> 
>>>> Thanks 
>>>> Gianluca 
>>>> 
>>>> Il giorno martedì 24 marzo 2015 16:29:55 UTC+1, Waldbieser, Carl ha 
>>>> scritto: 
>>>>> 
>>>>> 
>>>>> Gianluca, 
>>>>> 
>>>>> Is this a development environment or is it a production environment
>>>> where 
>>>>> user's web browsers need to trust the certificate?  In the latter case,
>>>> you 
>>>>> will need to generate a private key, make a certificate request, and get 
>>>>> certificate signed from a Certificate Authority (CA). 
>>>>> 
>>>>> In a development environment, it is possible to be your own CA.  You
>>>> would 
>>>>> basically do the same things as in production, but you would need to add 
>>>>> the local CA certificates to the browsers you will be testing.  If you
>>>> use 
>>>>> proxy CAS, your CAS server will also need to trust your private CA. 
>>>>> 
>>>>> Thanks, 
>>>>> Carl Waldbieser 
>>>>> ITS System Programmer 
>>>>> Lafayette College 
>>>>> 
>>>>> ----- Original Message ----- 
>>>>> From: "Gianluca Diodato" <gianluca...@gmail.com <javascript:>> 
>>>>> To: cas-...@lists.jasig.org <javascript:> 
>>>>> Sent: Tuesday, March 24, 2015 11:10:29 AM 
>>>>> Subject: [cas-user] SSL problem (I need tutorial!!) Cas Server on remote 
>>>>> machine , Java Cas Client other machine 
>>>>> 
>>>>> Hi All, 
>>>>> can anyone help me with my configuration problem as subject?? 
>>>>> I need to configure my envorinment to SSL like this: 
>>>>> 
>>>>> Machine 1: CAS SERVER -- Ubuntu 12.04 - Tomcat 7 - JDK 1.6 -- SSL 
>>>>> certificate generate with openssl + apr and added to Tomcat + Users into 
>>>>> MysqlDB (WORKS) 
>>>>> Machine 2: Cas Client java 3.3.3 (jar) imported into my webapp with only 
>>>>> welcome page at moment -- Eclipse Luna + Tomcat 7 + JDK 1.6 
>>>>> 
>>>>> In machine 2 how to generate trusted certificate in order to connect my 
>>>>> client to CAS Server to login my users? 
>>>>> Anyone know if exists tutorial or guide step-by-step even basic. 
>>>>> 
>>>>> Please, help me 
>>>>> 
>>>>> Gianluca   
>>>>> 
>>>>> -- 
>>>>> You are currently subscribed to cas-...@lists.jasig.org <javascript:>
>>>> as: 
>>>>> wald...@lafayette.edu <javascript:> 
>>>>> To unsubscribe, change settings or access archives, see 
>>>>> http://www.ja-sig.org/wiki/display/JSG/cas-user 
>>>>> 
>>>>> -- 
>>>>> You are currently subscribed to cas-...@lists.jasig.org <javascript:>
>>>> as: 
>>>>> jasig-cas-user...@googlegroups.com <javascript:> 
>>>>> To unsubscribe, change settings or access archives, see 
>>>>> http://www.ja-sig.org/wiki/display/JSG/cas-user
>>>> 
>>>> -- 
>>>> You are currently subscribed to cas-...@lists.jasig.org <javascript:> as: 
>>>> jasig-cas-user...@googlegroups.com <javascript:> 
>>>> To unsubscribe, change settings or access archives, see 
>>>> http://www.ja-sig.org/wiki/display/JSG/cas-user
>>> 
>>> -- 
>>> You are currently subscribed to cas-...@lists.jasig.org as: 
>>> dkopy...@unicon.net
>>> To unsubscribe, change settings or access archives, see 
>>> http://www.ja-sig.org/wiki/display/JSG/cas-user
>> 
>> -- 
>> You are currently subscribed to cas-...@lists.jasig.org as: 
>> jasig-cas-user...@googlegroups.com
>> To unsubscribe, change settings or access archives, see 
>> http://www.ja-sig.org/wiki/display/JSG/cas-user
> 
> -- 
> You are currently subscribed to cas-user@lists.jasig.org as: 
> dkopyle...@unicon.net
> To unsubscribe, change settings or access archives, see 
> http://www.ja-sig.org/wiki/display/JSG/cas-user

-- 
You are currently subscribed to cas-user@lists.jasig.org as: 
arch...@mail-archive.com
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-user

Reply via email to