?
Solved

keystore backup in linux

Posted on 2010-11-15
1
Medium Priority
?
735 Views
Last Modified: 2012-05-10
What is the proper way to back keystore.jks file...
My assumption is I just backup my store and if I have to rebuild my system, I would just need to re-import the keystore. Was not sure if there were additional files I would need to gab as-well.
0
Comment
Question by:mhjassoc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 9

Accepted Solution

by:
expert_tanmay earned 1000 total points
ID: 34142288
You may just back up your keystore on an external device after encryption so that even if some one finds access to your keystore it wont be of any good to him
To encrypt the keystore file use the command
gpg -c keystore-filename

the above command will ask you for a password. Please remember the password as you will need that to decrypt your keystore.
To decrypt just type
gpg keystore-filename.gpg

Cheers...
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Network Interface Card (NIC) bonding, also known as link aggregation, NIC teaming and trunking, is an important concept to understand and implement in any environment where high availability is of concern. Using this feature, a server administrator …
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
Suggested Courses

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question