Create a Tomcat self-signed certificate: Difference between revisions
From WickyWiki
No edit summary |
m 3 revisions |
||
| (One intermediate revision by one other user not shown) | |||
| Line 1: | Line 1: | ||
201110 | [[Category:Ubuntu]] | ||
[[Category:Ubuntu Guide]] | |||
[[Category:201110]] | |||
Ubuntu 11.04 | |||
http://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html | http://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html | ||
Latest revision as of 07:21, 5 July 2013
Ubuntu 11.04
http://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html
Create a Tomcat self-signed certificate. The key should be stored in a location that is only accessible with root rights. In this case /etc/ssl/private/ is used.
sudo keytool -genkey -alias tomcat -keyalg RSA -keystore /etc/ssl/private/wilbertvolkers.dyndns.org.keystore
- enter sudo pwd
- enter new keystore password (changeit)
- reenter
- first and last name (wilbertvolkers.dyndns.org)
- departement
- organisation
- city
- province
- countrycode
- key password for tomcat, use "changeit"
Configure Tomcat to use your certificate:
sudo gedit .../tomcat/conf/server.xml
...
<Connector
port="8443" maxThreads="200"
scheme="https" secure="true" SSLEnabled="true"
keystoreFile="/etc/ssl/private/wilbertvolkers.dyndns.org.keystore" keystorePass="changeit"
clientAuth="false" sslProtocol="TLS" />
...