Here is the sample certificates that i generated and used to communicate 2 IS ( one acting as client and other as server on https port with require client cert)
keytool is available in /jvm/bin
For application1
****** Step 1: Creating the “public-private” key pair.
keytool -genkey -alias application1 -validity 365 -keystore E:\SSL-Certs\application1_ks.jks -keysize 2048 -keyalg RSA
E:\SSL-Certs\application1_ks.jks is the file that you will configure in application1 keystore
****** Step 2: Validate the “public-private” key pair.
keytool -list -v -keystore E:\SSL-Certs\application1_ks.jks
****** Step 3: Extract the “public key” from the “public-private” key pair
keytool -export -alias application1 -keystore E:\SSL-Certs\application1_ks.jks -rfc -file E:\SSL-Certs\application1_publickey.cer
E:\SSL-Certs\application1_publickey.cer is the file you will configure in application2 client certificates
****** Step 4: Create the Truststore using the public key extracted.
keytool -import -alias application1 -file E:\SSL-Certs\application1_publickey.cer -keystore E:\SSL-Certs\application1_ts.jks
keytool -list -v -keystore E:\SSL-Certs\application1_ts.jks
For application2
****** Step 5: Creating the “public-private” key pair.
keytool -genkey -alias application2 -validity 365 -keystore E:\SSL-Certs\application2_ks.jks -keysize 2048 -keyalg RSA
E:\SSL-Certs\application2_ks.jks is the file that you will configure in application2 keystore
****** Step 6: Validate the “public-private” key pair.
keytool -list -v -keystore E:\SSL-Certs\application2_ks.jks
****** Step 7: Extract the “public key” from the “public-private” key pair
keytool -export -alias application2 -keystore E:\SSL-Certs\application2_ks.jks -rfc -file E:\SSL-Certs\application2_publickey.cer
E:\SSL-Certs\application2_publickey.cer is the file you will configure in application1 client certificates
****** Step 8: Create the Truststore using the public key extracted.
keytool -import -alias application2 -file E:\SSL-Certs\application2_publickey.cer -keystore E:\SSL-Certs\application2_ts.jks
keytool -list -v -keystore E:\SSL-Certs\application2_ts.jks
****** Step 9: Add both public cert to the truststore .
keytool -import -alias application2 -file E:\SSL-Certs\application2_publickey.cer -keystore E:\SSL-Certs\application1_ts.jks
keytool -import -alias application1 -file E:\SSL-Certs\application1_publickey.cer -keystore E:\SSL-Certs\application2_ts.jks
E:\SSL-Certs\application1_ts.jks is the file that you will configure in application1 truststore
E:\SSL-Certs\application2_ts.jks is the file that you will configure in application2 truststore
#soa#API-Management#webMethods