![]() ![]() This process of establishing "TLS" handshake with keystores is getting very annoying on top of that I must establish SASL plain authentication with Firebase CCS which is probably even more annoying since I have to somehow create a server to do that.Īny help or suggestions would be helpful. Could someone please point me in the right direction. I don't think that is the right way in order to include my intermediate certificates. ![]() Select the View Details sub-menu from the pop-up menu and from there choose Certificate Chain. I have been following this stackoverflow answer How to create a certificate chain using keytool? but i see that in there you have to create different keypairs which ask you to create different common names. Right-click on the Key Pair entry in the KeyStore Entries table. Now, how in the world do I include the other two intermediate certificates using keystore explorer. To import, highlight a certificate and click the Import button. The certificates in a chain can be imported in any order. If more than one are shown, each of these certificates will need to be imported into the keystore to complete the certificate chain. Keystore Explorer says that the public keys matched in both my keystore public key and their issued Free Trial SSL certificate. The Certificate Hierarchy will show one or more certificate used by the authenticating server. ![]() On the keypair icon in Keystore Explorer I right clicked and then selected "import CA reply from file" I selected the file that was issued by Geotrust to me for my keystore. I opened the keystore whose key was validated by GeoTrust when they issued me the free-trial SSL certificate. The goal is to establish "TLS" with Firebase Cloud messaging. According to their website I must include two more intermediate certificates in order to create a certificate chain. I have a certificate issued by a CA "GeoTrust". ![]()
0 Comments
Leave a Reply. |