Step 1: To create key database file
Go to location /IBMIHS/HTTPServer/bin { IHS bin }
Command :
./gskcmd -keydb -create -db samplecert.kdb -pw 123456 -type cms -expire 120 -stash samplecert.sth
Syntax : <ihsinst>/bin/gskcmd -keydb -create -db <filename> -pw <password> -type
<cms | jks | jceks | pks12> -expire <days> -stash <filename_of_key_database>.sth
Screenshot 1:
Reference Link : https://www.ibm.com/knowledgecenter/
Step 2: Create a certificate request ( .CSR )
Command :
./gskcmd -certreq -create -db samplecert.kdb -pw 123456 -dn CN=*.samplecert.com,O=MB,L=MUM,ST=Maha,C=IN -label samplecertificate -san_dnsname www.samplecert.com -san_emailaddr middlewarebox@gmail.com -san_ipaddr 192.168.0.28 -sig_alg SHA1WithRSA -size 2048 -file samplecert.csr
Syntax : <ihsroot>/bin/gskcapicmd -certreq -create -db <database> -pw <password> \
-dn <distinguished name> -label <labelname> -size <size> -file <outputfilename>
Screenshot 2:
Refrence Link : https://www.ibm.com/knowledgecenter/
Step 3: Now view the created .csr file details.
Command : cat samplecert.csr
Output:
[root@localhost bin]# cat samplecert.csr
-----BEGIN NEW CERTIFICATE REQUEST-----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-----END NEW CERTIFICATE REQUEST-----[root@localhost bin]#
[root@localhost bin]#
Screenshot 3:
Step 4: Review the csr file details by using csr decoder websites.
Copy and Paste Certificate Signing Request (CSR)
URL : https://www.sslshopper.com/csr-decoder.html
URL : https://www.sslchecker.com/csr/decode
URL : https://cryptoreport.websecurity.symantec.com/
URL : https://certlogik.com/decoder/
Screenshot 4:
Thanks :-) !
No comments:
Post a Comment