Sponsored Content
Operating Systems AIX Install VIOS SSL Certificate on Integrated Virtualization Manager Post 303027219 by JAY2068 on Tuesday 11th of December 2018 10:17:42 AM
Old 12-11-2018
None of those links is what I have. I do not have "IBM Spectrum Control" available to me. I have a P8 with AIX installed with three LPARS the vios has a website that controls the LPAR's. It has a self signed cert. We need to put our own certificate on this.


The second link shows using '/opt/ibm/ccm/create_security_artifacts.sh' but that file is not found anywhere on my VIOS.


I think the keystore is here (not 100% sure): /usr/ios/lpm/gui/httpd/security/keystore/ibmjsse2.jks and .jts
 

9 More Discussions You Might Find Interesting

1. Web Development

SSL Certificate Installation problem

Hello everybody Hope somebody can help me I'm trying to install SSL Certificate on Apache/mod_ssl on Linux with Zend for Oracle. I bought and downloaded certificate from certificate from Network Solutions. Than I followed the instructions to the dot. I created a directory for certificate... (2 Replies)
Discussion started by: Trusevich
2 Replies

2. Web Development

SSL certificate

Dear All Anyone know how to issue two different certification on apache virtualhost fyi i have one virtualhost eg 69.192.1.25:443 already signed with verisign how can i configure another virtualhost 69.192.1.25:443 which signing with another certificate which self signing. i search net not... (1 Reply)
Discussion started by: netxus
1 Replies

3. AIX

Installing SSL certificate on AIX

Hello, I am new in UNIX, and some one asks me to install SSL certificates to allow exchange with an external system. Can someone tell how to install certificate (ex : verisignxxx.cer) on a UNIX server? Many thanks. Tibo (4 Replies)
Discussion started by: tibo51
4 Replies

4. Cybersecurity

SSL certificate

Hi guys. I have some questions about ssl certificates. I looked at SSL providers and saw that they are providing 2 types of certificates: per server or per domain. my server host name is: srv1.example.com I have a smtp, imap, web server on this box. but all services accessed by different... (1 Reply)
Discussion started by: majid.merkava
1 Replies

5. Web Development

export SSL certificate

we are doing TCP for our systems. I have a working SSL certificate on prodction webserver. Im planning to export it to our DR server for TCP purposes. However when I export based on the procedure below, it doesn't work. When I restart the DR webserver, it still says the certifcate is expired.Any... (1 Reply)
Discussion started by: lhareigh890
1 Replies

6. AIX

IBM Integrated Virtualization Manager

We have AIX runninng on IBM Bladecenter When opening a terminal window for one of the lpars, in Internet explorer it opens a pop up window and I can login, but when using Mozilla Firefox the popup window is closed immediately or doesn't even open. Please help. (1 Reply)
Discussion started by: wjace
1 Replies

7. Red Hat

SSL Certificate Renewal on Tomcat

Hi, I want to renew the ssl certificate for one of my application on tomcat without down time. I want to know what would the possible impacts for the users who currently have sessions to the app. Regards, Arumon (1 Reply)
Discussion started by: arumon
1 Replies

8. Cybersecurity

SSL Certificate Stores

Hey everyone, I'm trying to get a lay of the land for OS and Application Certificate Stores. Can someone confirm that I have this concept right? If the application you're using say Firefox has it's own trusted CA store, it uses that exclusively. So if you're running firefox in Windows, Firefox... (4 Replies)
Discussion started by: Lost in Cyberia
4 Replies

9. Web Development

CronJobs issues after SSL certificate

Hello! I had a cron job running on my website, activating a php script every friday. The Php script just activated another photo to add in the gallery. It worked fine until I got an SSL certificate for my website, then everything broke. This was the command before: lynx -source... (0 Replies)
Discussion started by: AGDesign
0 Replies
QCATOOL(1)						Qt Cryptographic Architecture (QCA)						QCATOOL(1)

NAME
qcatool - command line tool for the Qt Cryptographic Architecture DESCRIPTION
qcatool is a command line tool for performing various cryptographic operations with the Qt Cryptographic Architecture (QCA). qcatool can also be used for testing and debugging QCA. USAGE
qcatool has a range of options and commands. You only ever get to use one command, but you may use several, one or no options. OPTIONS
As noted above, these are all optional, and may be combined. --pass=PASSWORD Specify the password to use. This is probably a bad idea except for testing, because anyone can read the arguments to a command line application. --newpass=PASSWORD Specify the new password to use for password change with the key changepass and keybundle changepass commands. This is probably a bad idea except for testing, because anyone can read the arguments to a command line application. --nonroots=CERTIFICATES Specify additional certificates, not trusted, but which may be used in the trust path if appropriate trust can be established. --roots=CERTIFICATES Specify additional certificates which can be used as trusted (root) certificates. --nosys Disable use of the standard root certificates that are provided by the operating system. --noprompt Disable prompting for passwords/passphrases. If you do not provide the passphrase on the command line (with --pass or --newpass) this will cause qcatool to abort the command if a password/passphrase is required. --ordered If outputting certificate information fields (Distinguished Name and Subject Alternative Name), show them in same the order that they are present in the certificate rather than in a friendly sorted order. --debug Enable additional output to aid debugging. --log-file=FILENAME Log to the specified file. --log-level=LEVEL Log at the specified level. The log level can be between 0 (none) and 8 (most). --nobundle When S/MIME signing, do not bundle the signer's certificate chain inside the signature. This results in a smaller signature output, but requires the recipient to have all of the necessary certificates in order to verify it. COMMANDS
help, --help, -h Output usage (help) information. version, --version, -v Output version information. plugins List available plugins. Use the --debug option to get more information on plugins which are found and which ones actually loaded. config save [provider] Save provider configuration. Use this to have the provider's default configuration written to persistent storage, which you can then edit by hand. config edit [provider] Edit provider configuration. The changes are written to persistent storage. key make rsa|dsa [bits] Create a key pair key changepass [K] Add/change/remove passphrase of a key cert makereq [K] Create certificate request (CSR) cert makeself [K] Create self-signed certificate cert makereqadv [K] Advanced version of 'makereq' cert makeselfadv [K] Advanced version of 'makeself' cert validate [C] Validate certificate keybundle make [K] [C] Create a keybundle keybundle extract [X] Extract certificate(s) and key keybundle changepass [X] Change passphrase of a keybundle keystore list-stores List all available keystores keystore list [storeName] List content of a keystore keystore monitor Monitor for keystore availability keystore export [E] Export a keystore entry's content keystore exportref [E] Export a keystore entry reference keystore addkb [storeName] [cert.p12] Add a keybundle into a keystore keystore addpgp [storeName] [key.asc] Add a PGP key into a keystore keystore remove [E] Remove an object from a keystore show cert [C] Examine a certificate show req [req.pem] Examine a certificate request (CSR) show crl [crl.pem] Examine a certificate revocation list show kb [X] Examine a keybundle show pgp [P|S] Examine a PGP key message sign pgp|pgpdetach|smime [X|S] Sign a message message encrypt pgp|smime [C|P] Encrypt a message message signencrypt [S] [P] PGP sign & encrypt a message message verify pgp|smime Verify a message message decrypt pgp|smime ((X) ...) Decrypt a message (S/MIME needs X) message exportcerts Export certs from S/MIME message ARGUMENTS
The arguments to the commands are as follows. K = private key. C = certificate. X = key bundle. P = PGP public key. S = PGP secret key. E = generic entry. These must be identified by either a filename or a keystore reference ("store:obj"). AUTHOR
qcatool was written by Justin Karneges as part of QCA. This manual page was written by Brad Hards. qcatool 1.0.0 August 2007 QCATOOL(1)
All times are GMT -4. The time now is 08:59 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy