Watch Thawte's Tutorial Videos for a more visual experience!
Note: If you are unable to view the video, please click here to go directly to the video source.
To generate a CSR for Jetty Java HTTP Servlet Web Server follow the instructions below:
Step 1: Generate a Keystore and a Keyentry (Private Key):
- Create a certificate keystore and private key by executing the following command:
keytool -genkey -alias [enter_alias_name] -keyalg RSA -keystore [enter_keystore_name] -keysize 2048
- Enter and re-enter a keystore password. Java servers use a default password of changeit. Hit Enter if you want to keep the default
password. If you use a different password, you will need to specify a custom password in the server.xml configuration file.
- This command will prompt for the following X.509 attributes of the certificate:
First and last name (Common Name (CN)): Enter the domain of your website (i.e. www.myside.org) in the "first- and lastname" field.. It looks like "www.company.com" or "company.com".
Organizational Unit (OU): This field is optional; but can be used to help identify certificates registered to an organization. The Organizational Unit (OU) field is the name of the department or organization unit making the request.
Organization (O): If your company or department has an &, @, or any other symbol using the shift key in its name, you must spell out the symbol or omit it to enroll. Example: XY & Z Corporation would be XYZ Corporation.
Locality or City (L): The Locality field is the city or town name, for example: Mountain View.
State or Province (S): Spell out the state completely; do not abbreviate the state or province name, for example: California
Country Name (C): Use the two-letter code without punctuation for country, for example: US or CA
NOTE: Thawte certificates can only be used on Web servers using the Common Name specified during enrollment. For example, a certificate for the domain "domain.com" will receive a warning if accessing a site named www.domain.com or "secure.domain.com", because "www.domain.com" and "secure.domain.com" are different from "domain.com".
- When prompted for the password for the private key alias, press Enter. This will set the private key password to the same password used for the keystore from the previous step.
NOTE: Make note of the private key and the keystore password. If lost they cannot be retrieved.
Step 2: Backup Keystore file:
To backup the keystore file with the keyentry just created, please refer to the following solution: SO1871
Step 3: Generate a CSR off the Keyentry:
- Run the following command to generate the CSR:
keytool -certreq -alias [alias_name] -file certreq.csr -keystore [keystore_name]
NOTE: CSRs generated using the MD5 digest (signature) algorithm are no longer allowed.
CSRs must be generated using SHA-1 or SHA-256/384/512
Alternatively, try to specify SHA-1 using the following command:
keytool -certreq -alias [alias_name] -file certreq.csr -keystore [keystore_name] -sigalg SHA1withRSA
- To copy and paste the file certreq.csr into the enrollment form, open the file in a text editor that does not add extra characters (Notepad or Vi are recommended).
Make sure to include the "BEGIN CERTIFICATE REQUEST" and "END CERTIFICATE REQUEST" header and footer.
The text file should look like this:
-----BEGIN CERTIFICATE REQUEST-----
-----END CERTIFICATE REQUEST-----
For instructions on how to import the Certificate into the Keystore, please see the following solution: SO1622