+

Search Tips | Advanced Search

Scenario: Creating a key-ring file

In this scenario, we can request a certificate and create a key-ring file.


Before you begin

This task assumes you request a new certificate from a trusted Certificate Authority (CA) by using iKeyman, and that your personal certificate is returned to you in a file (for example, server.cer). This is sufficient to perform server authentication. If you require client authentication you must request a second certificate (for example, client.cer) and perform the following steps twice, to create two key-ring files.


About this task

We can use either the iKeyman command-line interface (CLI) or the iKeyman GUI to request the certificate.


Procedure

Use one of the following methods to create a key-ring file:


What to do next

You must also ensure that the CA certificate of the CA that signed the personal certificate is present in the CA key-ring file. Depending on your MQIPT configuration, the CA key-ring file might be a different file from the personal certificate key-ring file. Check the contents of the sample CA key-ring file, sslCAdefault.pfx, by using iKeyman, to see if your personal certificates were signed by one of the listed CAs.

If you need to add a CA certificate, we can use either the iKeyman CLI or the iKeyman GUI.

To add a CA certificate by using the iKeyman CLI:
mqiptKeycmd -cert -add -db sslCAdefault.pfx -pw key_password -type key_type
            -file ca_file_name.crt -label label
where:

To add a CA certificate by using the iKeyman GUI:

To use these new key-ring files for server authentication, see the scenario Authenticating an SSL/TLS server, and set the following route properties:
SSLClientCAKeyRing=C:\\mqipt\\ssl\\sslCAdefault.pfx
SSLClientCAKeyRingPW=C:\\mqipt\\ssl\\sslCAdefault.pwd
SSLServerKeyRing=C:\\mqipt\\ssl\\myServer.pfx
SSLServerKeyRingPW=C:\\mqipt\\ssl\\myServer.pwd
SSLServerCAKeyRing=C:\\mqipt\\ssl\\sslCAdefault.pfx
SSLServerCAKeyRingPW=C:\\mqipt\\ssl\\sslCAdefault.pwd
To use these new key-ring files for client and server authentication, see the scenario SSL/TLS client authentication, and set the following route properties:
SSLClientKeyRing=C:\\mqipt\\ssl\\myClient.pfx
SSLClientKeyRingPW=C:\\mqipt\\ssl\\myClient.pwd
SSLClientCAKeyRing=C:\\mqipt\\ssl\\sslCAdefault.pfx
SSLClientCAKeyRingPW=C:\\mqipt\\ssl\\sslCAdefault.pwd 
SSLServerKeyRing=C:\\mqipt\\ssl\\myServer.pfx
SSLServerKeyRingPW=C:\\mqipt\\ssl\\myServer.pwd 
SSLServerCAKeyRing=C:\\mqipt\\ssl\\sslCAdefault.pfx
SSLServerCAKeyRingPW=C:\\mqipt\\ssl\\sslCAdefault.pwd