Show TOC

Keytool UtilityLocate this document in the navigation structure

keytool is a JDK utility that manages a keystore (database) of private keys and associated certificates, as well as certificates from trusted entities.

SAP Mobile Platform uses a single keystore file, located at <SMP_HOME>\Server\configuration\smp_keystore.jks. This is the file to configure and protect.

keytool is in <SMP_HOME>sapjvm_7\bin. keytool lets users create and manage their own public and private key pairs and associated certificates for use in self-authentication, or data integrity and authentication services, using digital signatures. It also lets isers cache the public keys (in the form of certificates) of their communicating peers.

Note After importing a certificate into the keystore, you must restart SAP Mobile Platform Server before logging into the Management Cockpit.
keytool -list | -printcert | -import | -export| -delete | -selfcert | -certreq | -genkey [<options>]
displays the contents of a keystore or keystore entry.
displays the contents of a certificate stored in a file. Check this information before importing a certificate as a trusted certificate. Make sure the certificate prints as expected.
  • a certificate or certificate chain to the list of trusted certificates, or,
  • a certificate reply received from a certificate authority (CA) as the result of submitting a certificate signing request (CSR).
The value of the -alias option indicates the type of import you are performing. If the alias exists in the database, then it is assumed you want to import a certificate reply. keytool checks whether the public key in the certificate reply matches the public key stored with the alias, and exits if they do not match. If the alias identifies the other type of keystore entry, the certificate is not imported. If the alias does not exist, it is created, and associated with the imported certificate.
exports a certificate to a file.
deletes a certificate from the list of trusted certificates.
generates a self-signed certificate. The generated certificate is stored as a single-element certificate chain in the keystore entry identified by the specified alias, where it replaces the existing certificate chain.
generates a certificate signing request (CSR), using the PKCS #10 format. A CSR is intended to be sent to a CA, which authenticates the certificate requestor and returns a certificate or certificate chainthat replaces the existing certificate chain in the keystore.
generates a key pair (a public key and associated private key). Wraps the public key into an X.509 v1 self-signed certificate, which is stored as a single-element certificate chain. This certificate chain and the private key are stored in a new keystore entry identified by <<alias>>.
-genkey Option Description
-keystore <<keystoreLocation>> Name and location of the persistent keystore file for the keystore managed by keytool. If you specify a keystore that does not exist, a keystore is created. If you do not specify a -keystore option, the default keystore is a file named .keystore in your home directory. If that file does not exist, it is created.
-storepass <<password>> The password that protects keystore integrity. The password must be at least 6 characters long and provided to all commands that access the keystore contents. If a -storepass option is not provided at the command line, the user is prompted for it.
-file <<certificateFile>> The certificate file location.
-noprompt During import, removes interaction with the user.
-trustcacerts When importing a certificate reply, the certificate reply is validated using trusted certificates from the keystore and the certificates configured in the cacerts keystore file. cacerts resides in the JDK security properties directory, java.home\lib\security, where java.home is the runtime environment's directory. The cacerts file represents a system-wide keystore with CA certificates. System administrators can configure and manage that file using keytool, specifying "jks" as the keystore type.
-alias <<alias>> The logical name for the certificate you are using.
-keypass <<password>> The password that protects the private key of the key pair. Press Enter at the prompt to set the key password to the password associated with the keystore. keypass must be at least 6 characters long.
Example 1: Display the contents of the keystore
keytool -list -keystore <filePath>\configuration\smp_keystore.jks -storepass <storepass>
Example 2: Import a certificate reply from a CA
keytool -import -file <certificate file> -keystore <filePath>\configuration\smp_keystore.jks -keypass <storepass> -storepass <storepass> -noprompt -trustcacerts -alias <alias>
Note Use -keypass <storepass> because alias passwords must match the storepass to work properly in SAP Mobile Platform.
Example 3: Delete a certificate
keytool -delete -alias <alias> -keystore <filePath>\configuration\smp_keystore.jks -storepass <storepass>
Example 4: Generate a key pair
keytool -genkey -alias -keystore <filePath>\configuration\smp_keystore.jks

The certificate request must be signed by a CA or self-signed by using the -selfcert keytool option.

Note Use the -alias flag to give the keys an explicit name you can remember. Then, use a -certreq command (using the same -alias) to generate a certificate signing request based on that keypair. Once you get back the signed certificate, use the -import command with the same -alias to get a private certificate where you can use it. The -alias for the default server certificate used on HTTPS listeners is "smp_crt".
Example 5: Use the -sigalg SHA1withRSA parameter

The jdk1.7 keytool uses the SHA256withRSA algorithm by default; however, some certificate authorities (CAs) do not support this algorithm and use the -sigalg SHA1withRSA parameter where the CSR is generated.

keytool.exe -certreq -keyalg RSA -alias smp_crt -sigalg SHA1withRSA-file request.csr -keystore smp_keystore.jks -storepass keystorepassword
Example 6: Use -import to import a trusted CA certificate
keytool -import -file <certificate file> -keystore <filePath>\configuration\smp_keystore.jks -storepass <storepass> -noprompt -trustcacerts 
-alias <alias>

This is identical to Example 2 except since CA certs do not have private keys, the -alias does not need a password so you may remove the -keypass <storepass> argument.