cxf-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From cohei...@apache.org
Subject [cxf-fediz] branch master updated: Update HowToGenerateKeysREADME.html - This closes #22
Date Tue, 31 Oct 2017 11:51:36 GMT
This is an automated email from the ASF dual-hosted git repository.

coheigea pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf-fediz.git


The following commit(s) were added to refs/heads/master by this push:
     new dbf392f  Update HowToGenerateKeysREADME.html  - This closes #22
dbf392f is described below

commit dbf392fc1c1e82451ed2ed8d7500e4cd626c17fa
Author: Matthew Broadhead <nbmlaw@gmail.com>
AuthorDate: Sat Oct 28 20:20:07 2017 +0200

    Update HowToGenerateKeysREADME.html
     - This closes #22
    
    idp-ssl-key.jks is mentioned as idp-ssl-server.jks
---
 examples/samplekeys/HowToGenerateKeysREADME.html | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/examples/samplekeys/HowToGenerateKeysREADME.html b/examples/samplekeys/HowToGenerateKeysREADME.html
index 099cc7e..695f613 100644
--- a/examples/samplekeys/HowToGenerateKeysREADME.html
+++ b/examples/samplekeys/HowToGenerateKeysREADME.html
@@ -12,7 +12,7 @@ is recommended.</p>
 <th>Keystore (Password)</th><th>Key Alias (Password)</th><th>Location</th><th>Creation
Script Used</th><th>Needs to trust</th><th>Is trusted by</th></tr>
 <tr><td colspan="6"><strong><em>Servlet Container Keystores:  The
keys can be simply placed in the root folder of each Servlet Container installation.  They
are used to configure SSL for the Servlet Container instances as described here for Tomcat:
<a href="http://cxf.apache.org/fediz-tomcat.html">http://cxf.apache.org/fediz-tomcat.html</a>.
 For Tomcat keys only, the keystore password and the private key password needs to be the
same.</em></strong></tr>
 <tr><td>idp-ssl-key.jks (tompass)</td><td>mytomidpkey (tompass)</td><td>base
folder of Tomcat instance holding the IDP and IDP STS</td>
-    <td><code>keytool -genkeypair -validity 730 -alias mytomidpkey -keystore
idp-ssl-server.jks -dname "cn=localhost" -keypass tompass -storepass tompass -keysize 2048
-keyalg RSA</code><br/><br/><code>keytool -keystore idp-ssl-server.jks
-storepass tompass -export -alias mytomidpkey -file MyTCIDP.cer</code></td>
+    <td><code>keytool -genkeypair -validity 730 -alias mytomidpkey -keystore
idp-ssl-key.jks -dname "cn=localhost" -keypass tompass -storepass tompass -keysize 2048 -keyalg
RSA</code><br/><br/><code>keytool -keystore idp-ssl-key.jks -storepass
tompass -export -alias mytomidpkey -file MyTCIDP.cer</code></td>
     <td>Nobody</td><td>Fediz IDP module<br/><br/>wsclientWebapp's
webapp module<br/><br/>Browser</td></tr> 
 <tr><td>rp-ssl-key.jks (tompass)</td><td>mytomrpkey (tompass)</td><td>base
folder of Tomcat instance holding the relying party applications for both samples (simpleWebapp
and wsclientWebapp); STS public cert NOT imported anymore - instead use ststrust.jks</td>
     <td><code>keytool -genkeypair -validity 730 -alias mytomrpkey -keystore rp-ssl-key.jks
-dname "cn=localhost" -keypass tompass -storepass tompass -keysize 2048 -keyalg RSA

-- 
To stop receiving notification emails like this one, please contact
['"commits@cxf.apache.org" <commits@cxf.apache.org>'].

Mime
View raw message