java - Two-way SSL communication with Tomcat -


a provider our system works has given certificate named mm_base64.cer. our keystore mitkeystore. using our keystore this:

<connector port="8443" protocol="org.apache.coyote.http11.http11nioprotocol"               maxthreads="150" sslenabled="true" scheme="https" secure="true"               clientauth="false" sslprotocol="tls" keystorefile="path\mitkeystore" keystorepass="ourpass" /> 

we imported key our jdk , jvm this:

keytool -import -file "path\mm_base64.cer" -keystore "c:\program files\java\jre7\lib\security\cacerts" 

still, handshake problem occurs.

i looking @ this question. looks complicated. our issue complicated theirs? there easy way our system work provider's system?

i might wrong on one, think have import provider's certificate trust store. see here description of keystore vs trustore. have point tomcat trust store file in http connector config block inside server.xml.

the idea when ssl handshake occurs provider presents certificate , know if trusted or not tomcat uses truststore find information on certificate or certification authorities.


Comments

Popular posts from this blog

php - How to add and update images or image url in Volusion using Volusion API -

javascript - jQuery UI Splitter/Resizable for unlimited amount of columns -

javascript - IE9 error '$'is not defined -