Java User’s Guide
12.1 Secure Data Transfer
112
s
wm_java_usersguide_v12 Page 102 of 123 2008-02-25
Confidential / Released
5. Import CA root certificate and CA private key into java keystore
- Use the CA Root Certificate for the creation of Java Security Command. See Section
12.5.3.
- Execute command
6. Export private key from server certificate
- The private key is needed for the (HTTPS or Secure Connection)server configuration.
- Execute command
- Convert format
7. Send CA Root Certificate to the module
- Create Java Security Command “SetRootCert”. See Section 12.5.3.
- Send this command with AT^SJSEC to the module. See Section 12.4.3.
8. Send Java Security Command “Switch on Certificate Verification for HTTPS Connections”
to the module. See Section 12.5.3.
Result:
- You have a keystore for the configuration of the Java Security of the module.
- You have a signed server certificate (files “server.pem” or “server.der”).
- You have a private key file for your server configuration (files "server_privkey.pem" or
"server_privkey.der.
- The module contains the CA Root Certificat.
- HTTPS certificate verification is activate.
Consult the documentation of your web server on how to set.up the certificate on it.
>java -jar setprivatekey.jar -alias dummyca
-storepass keystorepass -keystore customer.ks
-keypass cakeypass
-keyfile ./democa/private/cakey.der -certfile ./democa/cacert.der
java -jar getprivatekey.jar -alias server
-keystore customer.ks -storepass keystorepass
-keypass keypass -keyfile server_privkey.der
>openssl pkcs8 -in server_privkey.der
-inform DER -out server_privkey.pem
-outform PEM -nocrypt