Creating a PKCS12 keystore for SPE
book
Article ID: 281651
calendar_today
Updated On:
Products
Protection Engine for NAS
Protection Engine for Cloud Services
Issue/Introduction
You request to know how to create a PKCS12 keystore for use with the Symantec Protection Engine's (SPE) RestAPI.
Resolution
- Login to a system with OpenSSL installed
Note: For this article we will be utilizing a Linux environment
- Copy your private key (herein referred to as "key.pem") and your certificate (herein referred to as "cert.pem") into the same folder
- Combine the two files using a command similar to the one below:
cat key.pem cert.pem > server.pem
- Create a PKCS12 keystore using the following command:
openssl pkcs12 -export -in server.pem -out keystore.pkcs12 -name my_alias
- If key.pem is encrypted (recommended) then you will be prompted for the password. Enter the password for key.pem and press
- Enter a password for the keystore and press
- Enter the password for the keystore again and press
- Stop the SPE RESTAPI Service
- Go to the /RestAPI directory.
- Fill out the
application.yml
as follows (Note: you will need to enter your own values)
server:
ssl:
enabled: true
key-alias: my_alias
key-store: path/to/keystore
key-store-type: PKCS12
key-store-password: yourKeyStorePassword
key-password: yourKeyPassword
Note: If your key.pem is not encrypted (i.e. doesn't include a password), then remove the line that starts with 'key-password'
- Save the
application.yml
file.
- Restart the SPE RestAPI service
Feedback
thumb_up
Yes
thumb_down
No