This content has been marked as final. Show 7 replies
The probably easiest way would be for you to ask them to combine all those files into a PKCS#12 (.p12/.pfx) file which you can easily import into the java key store. Otherwise, you would need to combine all those files yourself using some third party tools. I got a tool that can do all that if you get really stuck.
I have a file with a .pfx extension, which Windows recognizes but keytool doesn't. What do I do with it?
You cannot import the pfx as a certificate but as a keystore, ie:1 person found this helpful
keytool -v -importkeystore -srckeystore yourfile.pfx -srcstoretype PKCS12 -destkeystore truststore.jks -deststoretype JKS
Great! That got me past that problem, to another one. When I use the certificate to sign stuff, the Java accept-certificate dialog says it's not verified. It's a completely legit, paid for certificate. I figure it's a messed up chain back to a CA root in the keystore, yes? I used -trustcacerts when I imported, but that didn't change anything.
Any idea what could be wrong?
Your assumption is correct. Try without the -trustcacerts option and it should complain about which CA is missing so you know which one needs to be added.
I am a newbie on ADF and I also encountered this problem and eventually solved it by the solution i found on this thread.
But my next problem i encountered is the jarsigner:
jarsigner: Certificate chain not found for: employees. employees must reference a valid KeyStore key entry containing a private key and corresponding public key certificate chain.
I am just following this tutorial: http://docs.oracle.com/cd/E18941_01/tutorials/BuildingMobileApps/ADFMobileTutorial_1.html
Thanks in advance!
So you don't have an alias named 'employees', or it doesn't refer to a private key.
I suggest you run keytool -list and post the output here.