keytool is available in /jvm/bin
For Server1
Step 1: Creating the “public-private” key pair.
keytool -genkey -alias Server1 -validity 365 -keystore D:\Certificates\Server1_keystore.jks
Step 2: Validate the “public-private” key pair.
keytool -list -v -keystore D:\Certificates\Server1_keystore.jks
Step 3: Extract the “public key” from the “public-private” key pair
keytool -export -alias Server1 -keystore D:\Certificates\Server1_keystore.jks -rfc -file D:\Certificates\Server1_publickey.cer
Step 4: Create the Truststore using the public key extracted.
keytool -import -alias Server1 -file D:\Certificates\Server1_publickey.cer -keystore D:\Certificates\Server1_trustore.jks
keytool -list -v -keystore D:\Certificates\Server1_trustore.jks
For Server2
Step 5: Creating the “public-private” key pair.
keytool -genkey -alias Server2 -validity 365 -keystore D:\Certificates\Server2_keystore.jks
Step 6: Validate the “public-private” key pair.
keytool -list -v -keystore D:\Certificates\Server2_keystore.jks
Step 7: Extract the “public key” from the “public-private” key pair
keytool -export -alias Server2 -keystore D:\Certificates\Server2_keystore.jks -rfc -file D:\Certificates\Server2_publickey.cer
Step 8: Create the Truststore using the public key extracted.
keytool -import -alias Server2 -file D:\Certificates\Server2_publickey.cer -keystore D:\Certificates\Server2_trustore.jks
keytool -list -v -keystore D:\Certificates\Server2_trustore.jks
Combine
Step 9: Add both public cert to the truststore .
keytool -import -alias Server1 -file D:\Certificates\Server1_publickey.cer -keystore D:\Certificates\Server2_trustore.jks
keytool -import -alias Server2 -file D:\Certificates\Server2_publickey.cer -keystore D:\Certificates\Server1_trustore.jks
keytool -list -v -keystore D:\Certificates\Server2_trustore.jks
#webMethods#Integration-Server-and-ESB#B2B-Integration