Replies: 3 comments 2 replies
-
I've played a bit more and now also created a storepasswd with the password for the jks and a keypasswd file with the password for the key. Still no luck and the "keytool error: java.lang.Exception: Too many failures" still freaks me out.
Output still freaks me out... |
Beta Was this translation helpful? Give feedback.
-
There is an example toward the bottom of the doc page. I tested and added this sample command recently when there was another question here on the forum. |
Beta Was this translation helpful? Give feedback.
-
Hi, thanks for the answer. And this is basically solved but I'd like to hear your thoughts on my observations. TL;DR (Addendum: I'm not entirely sure if the key in this p12 is really unencrypted, its just my assumption based on some simple keytests of the resulting store) The long textI'm not sure how this is supposed to work. For a password protected keystore (jks) with a password protected key, where the key password is different from the keystore, the start script report
When checking the (probable) source of this error message I assume it comes from:
But this clearly doesn't take a parameter for the keypassword, and at most assumes that the key-password is the same as the jks password (based on keytool behaves) What am I missing? Did I look in the wrong places and my analysis/interpretation is wrong? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello,
I'm having a hard time understanding how a custom keystore for the TLS Server certificate is supposed to work with the ejbca-ce:9.0.0 image
Please bear with me, I'm feeling pretty noobish.
I've created a jks with the (unencrypted) private key, a signed certificate and the certificate of the signing ca.
I then bind-mounted a directory, containing this jks into the container.
I.e.
/var/docker/stuff/tls/
contains the jks in a 'ks' subfolder and I've bind mounted per directive in the docker compose file/var/docker/stuff/tls:/opt/keyfactor/secrets/external/tls
I've provided the APPSERVER_KEYSTORE_SECRET variable with the password of the jks
The log says, its trying to import the keystore but then gets stuck with an error:
Now:
Scenario:
An EJBCA docker instance, with TLS_SETUP_ENABLED=later, the Management CA will be exported from an external CA.
The EJBCA docker instance should present a custom TLS Server certificate.
Client certificates will be signed by the same CA that signed the TLS Server certificate.
I hope that makes sense and you can bring me up to speed. I know, this is a bit of a hoshposh and I'm not even sure I've asked the right questions.
Hope you can help me get this sorted, cheers! :)
Beta Was this translation helpful? Give feedback.
All reactions