It's all about the answers!

Ask a question

BF 7.1.2 install, validation process for PKCS certs?


Keir Morgan (4143) | asked Dec 08 '10, 3:48 a.m.
Greetings,

A simple question, what process does Install Manager / Build Forge
use to validate the PKCS12 cert for import as part of an install?

I have a pfx that I've exported out of our windows certificate
store, but Build Forge doesn't seem to like the file and indicates
that it should be in PKCS12 format and readable.

Oddly enough, 'openssl pkcs12 -in <cert>.p12 -info' seems to work
just fine. Any thoughts? Does the cert need to have a friendly name?
Should I be concerned about including the certificate chain?

I'm going to try converting it to a pem and then back to pk12 to
see if that makes a difference. I should easily be able to edit the
pem to create a few test cases, but it would be nice to have a
little more detail regarding why BF objects to the file.

For reference, this is Build Forge 7.1.2.01 (iFix 1) on Windows 2003 FP1.

Regards,

Keir
--

One answer



permanent link
Keir Morgan (4143) | answered Dec 13 '10, 3:02 p.m.
Just to follow up on this based on what I've learned.

The Java Key, Certificate, and KeyStore APIs are used to do the import.

A simple, 'keytool -list -storetype pkcs12 -keystore <store>' can be used
to validate the certificate.

In my case I needed to download the Unresricted JCE policy files for IBM's
JRE in order to resolve my problems.

Regards,

Keir
--

Your answer


Register or to post your answer.


Dashboards and work items are no longer publicly available, so some links may be invalid. We now provide similar information through other means. Learn more here.