Solved

java application, server 2008

Posted on 2014-04-05
5
985 Views
Last Modified: 2014-04-08
hi all experts

i'm having issue and confused on how to inject go-daddy .Cer file to weblogic server
i had been read a lot questions  & answers but not sure the Cer file from godaddy

do i need keytool to convert cer file from godaddy to PEM format?
what out do i have to do after that? can someone give me some link that really point out from godaddy CA standpoint

BTW when i download from godaddy  "Other" platform, this was directed from Godaddy tech guy recommendation, I think godaddy  don't know much about weblogic i was on phone with them for hours but no answer, they asked me call weblogic support. WOW
0
Comment
Question by:VN-PC view
  • 2
  • 2
5 Comments
 
LVL 61

Expert Comment

by:btan
Comment Utility
This link shared the steps from the beginning of submission CSR to GD the installation. The keytool use is included in those steps.

You will need
-identity.jks generated from the certificate.crt (CSR request response from GD)
-trust.jks generated from the gd_bundle.crt (RootCA and sometimes an intermediateCA certificate.)

Godaddy should provided two certificate files gd_bundle.crt  and certificate.crt files a/m. Actually you not necessarily need to go for .pem but it is normally for ease to create a certificate chain clubbing them in an order into that single .pem file

From the link, the .pem is created and explained
To use a certificate chain, append the additional PEM-encoded CA digital certificates to the digital certificate that was just issued to you for the WebLogic Server.  The order is important (include the files in the order of trust).  The server digital certificate should be the first digital certificate in the file.  The issuer of that digital certificate should be the next file and so on until you get to the self-signed root certificate authority certificate.  This digital certificate should be the last certificate in the file.  You cannot have blank lines between digital certificates.

The rest of the steps to import into WebLogic Server Admin console is shared in first link to configure the two .jks accordingly

There are additional means which is shared for interest and illustration
How do you install Godaddy SSL Certificate on Weblogic 10.3?
Installing Certificate in Weblogic Keystore
0
 

Author Comment

by:VN-PC view
Comment Utility
Hi  breadtan

There are additional means which is shared for interest and illustration
1) How do you install Godaddy SSL Certificate on Weblogic 10.3?
2) Installing Certificate in Weblogic Keystore


so I don't have to convert to PEM? this is just optional? all I have to follow step 1 & 2
many thanks
0
 
LVL 61

Accepted Solution

by:
btan earned 500 total points
Comment Utility
At least from (1) and (2) that is done w/o pem mentioned as it is doing on single cert and not cert chain. So if it is cert chain, then you need pem.

Pls do note the other link that I shared

Note: If you are creating a file with the digital certificates of multiple certificate authorities or a file that contains a certificate chain, you must use PEM format.   WebLogic Server provides a tool for converting DER format files to PEM format, and visa versa.
0
 

Author Closing Comment

by:VN-PC view
Comment Utility
Many thanks for the prompt reply.
0
 
LVL 61

Expert Comment

by:gheist
Comment Utility
Wrong window, sorry
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

We've all had that page pop up telling us there is a problem with the certificate and some of us continue on anyways and others run away to a safer competing site.  But what to do when you get the error - is it your problem or theirs?  What can you …
Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
This video discusses moving either the default database or any database to a new volume.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now