Quantcast
Channel: VMware Communities : All Content - VMware View
Viewing all articles
Browse latest Browse all 9103

View 4.6 and certificate import

$
0
0

I am attempting to import a certificate into VMware View on the security server.

 

I've attempted to use both a .crt and a .p7b.  The .crt was exported a a .p7b since Register.com doesn't include it in a Tomcat certificate purchase.  Any assistance would be greatly appreciated.

 

Commands and error messages:


C:\Program Files\VMware\VMware View\Server\jre\bin>keytool -import -keystore dem
o.p12 -storetype pkcs12 -alias tomcat -storepass xxxxxxx -keyalg "RSA" -trustca
certs -file c:\certs\certificate.crt

Owner: CN=sub.domain.com, OU=PositiveSSL, OU=Hosted by Register.com, OU=Domain
Control Validated
Issuer: CN=Register.com CA SSL Services (DV), O=Register.com, C=US
Serial number: xxxxxxxxxxxxxxxxx
Valid from: Thu May 05 18:00:00 MDT 2011 until: Sat May 05 17:59:59 MDT 2012
Certificate fingerprints:
         MD5:  xxxxxxxxxxx
         SHA1: xxxxxxxxxxx
         Signature algorithm name: SHA1withRSA
         Version: 3

Extensions:

#1: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
  Key_Encipherment
]

#2: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
  CA:false
  PathLen: undefined
]

#3: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 80 CA 54 40 A1 34 B1 EE   54 7F D9 86 58 0B F6 1B  ..T@.4..T...X...
0010: A9 DF 32 2A                                        ..2*
]
]

#4: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
  [
   accessMethod: 1.3.6.1.5.5.7.48.2
   accessLocation: URIName: http://crt.register.com/RegistercomSSLServicesCADV.c
rt,
   accessMethod: 1.3.6.1.5.5.7.48.1
   accessLocation: URIName: http://ocsp.register.com]
]

#5: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
  [DistributionPoint:
     [URIName: http://crl.register.com/RegistercomSSLServicesCADV.crl]
]]

#6: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
  [CertificatePolicyId: [1.3.6.1.4.1.6449.1.2.2.24]
[PolicyQualifierInfo: [
  qualifierID: 1.3.6.1.5.5.7.2.1
  qualifier: 0000: 16 32 68 74 74 70 3A 2F   2F 63 61 2E 72 65 67 69  .2http://c
a.regi
0010: 73 74 65 72 2E 63 6F 6D   2F 72 65 70 6F 73 69 74  ster.com/reposit
0020: 6F 72 79 2F 52 65 67 69   73 74 65 72 5F 43 50 53  ory/Register_CPS
0030: 2E 70 64 66                                        .pdf

]]  ]
]

#7: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
  serverAuth
  clientAuth
]

#8: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 96 36 9B F8 D6 E5 B3 68   4A 70 7A 7A 72 8D D3 6E  .6.....hJpzzr..n
0010: 2C 0B B9 31                                        ,..1
]

]

#9: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
  DNSName: sub.domain.com
  DNSName: www.sub.domain.com
]

Trust this certificate? [no]:  yes
keytool error: java.security.KeyStoreException: TrustedCertEntry not supported

 


C:\Program Files\VMware\VMware View\Server\jre\bin>keytool -import -keystore dem
o.p12 -storetype pkcs12 -alias tomcat -storepass xxxxxxx -keyalg "RSA" -trustca
certs -file c:\certs\demo.p7b

keytool error: java.lang.Exception: Input not an X.509 certificate

 

C:\Program Files\VMware\VMware View\Server\jre\bin>


Viewing all articles
Browse latest Browse all 9103

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>