Cep Terminals GSM/GPRS TERMINAL CT63 JAVA 6203 Manuale Utente

Codici prodotto
6203
Pagina di 109
Java User’s Guide
11.1 Secure Data Transfer
99
wm_java_usersguide_v19
Page 89 of 109
2012-01-27
Confidential / Released
5. Import CA root certificate and CA private key into java  keystore
- Use the CA Root Certificate for the creation of Java Security Command. Se
- Execute command
6. Export private key from server certificate
- The private key is needed for the (HTTPS or Secure Connection)server configuration. 
- Execute command
- Convert format
7. Send CA Root Certificate to the module
- Create Java Security Command “SetRootCert”. See 
- Send this command with AT^SJSEC to the module. See 
8. Send Java Security Command “Switch on Certificate Verification for HTTPS Connections”
to the module. See 
.
Result:
- You have a keystore for the configuration of the Java Security of the module.
- You have a signed server certificate (files “server.pem” or “server.der”).
- You have a private key file for your server configuration (files "server_privkey.pem" or
"server_privkey.der.
- The module contains the CA Root Certificat.
- HTTPS certificate verification is activate.
Consult the documentation of your web server on how to set.up the certificate on it.
>java -jar setprivatekey.jar -alias dummyca 
         -storepass keystorepass -keystore customer.ks
         -keypass cakeypass 
         -keyfile ./democa/private/cakey.der -certfile ./democa/cacert.der
java -jar getprivatekey.jar -alias server 
      -keystore customer.ks -storepass keystorepass 
      -keypass keypass -keyfile server_privkey.der
>openssl pkcs8 -in server_privkey.der 
                        -inform DER -out server_privkey.pem 
                        -outform PEM -nocrypt