On Sun, May 15, 2011 at 1:55 AM, Larry Bugbee <bug...@seanet.com> wrote:

>
>
> It is a matter of trust.  If your server is serving a very small group that
> will trust your self-signed cert, then fine.  If however your server is to
> be visited by a large number of people most of which won't know you, they
> would likely feel better if your cert was obtained from a well-known and
> trustable 3rd party.
>
>
Then, no luck! I have to go for 3rd party. So, here are the steps I am going
to follow, what do you say?

1. Generate Private key: with openssl genrsa -des3 -out myserv.key 2048
2. Remove passphrase from key:
3. Generate CSR: with openssl req -new -key myserv.key -out myserv.csr
4. Submit this csr into 3rd party
5. get the certificate and SAVE IT AS MYSERV.CRT ( am I correct here? )
6. Concatenation CRT+PRIVATE KEY and SAVE THE CONCATENATION AS PEM FORMAT
7. RE-ENCODE PEM INTO PKCS12
8. Create JKS
9. Now what? how can I install JKS for tomcat and apache? what do you
suggest me to do? any link?

-- 
Best,
Zico

Reply via email to