01.01.2013 Views

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

genkey Generates a key pair and wraps the public key into a<br />

self-signed certificate.<br />

alias Stores the self-signed certificate and private key in a new<br />

keystore entry identified by ITSO.<br />

dname Specifies the X.500 distinguished name to be associated with<br />

the alias. This is used as the issuer and subject fields of the<br />

self-signed certificate. <strong>The</strong> distinguished name consists of a<br />

number of fields separated by commas.<br />

keystore <strong>The</strong> keystore location.<br />

keypass <strong>The</strong> password used to protect the private key.<br />

storepass <strong>The</strong> password used to protect the integrity of the keystore.<br />

keyalg Specifies the algorithm to be used to generate the key pair.<br />

<strong>The</strong> keytool we used generated a self-signed certificate and private key using<br />

a distinguished name that specified the same information as our System SSL<br />

certificate request. <strong>The</strong> values we used for each field are listed in Table 8-4 on<br />

page 188. We specified the RSA algorithm to generate our key pair. We<br />

specified the same password for both the keystore and the private key.<br />

3. To see the self-signed certificate we had created, we used the keytool<br />

command in Example 8-7 to invoke the Key Management Tool to list the<br />

contents of the keystore. We used the -v parameter to show all details of the<br />

certificate in the keystore. Example 8-7 shows that the keystore has one entry<br />

and our certificate is owned by the same distinguished name as it is issued<br />

by.<br />

Example 8-7 Using keytool to list the contents of a keystore<br />

$[SC66] /ctg/scsctg5: keytool -list -v -keystore jssesslss.jks -storepass<br />

default<br />

Keystore type: jks<br />

Keystore provider: SUN<br />

Your keystore contains 1 entry:<br />

Alias name: itso<br />

Creation date: Tue Jun 25 17:10:35 EDT 2002<br />

Entry type: keyEntry<br />

Certificate chain length: 1<br />

Certificate[1]:<br />

Owner: CN=wtsc66oe.itso.ibm.com, O=<strong>IBM</strong>, OU=ITSO, L=San Jose, ST=California,<br />

C=US<br />

Issuer: CN=wtsc66oe.itso.ibm.com, O=<strong>IBM</strong>, OU=ITSO, L=San Jose, ST=California,<br />

C=US<br />

Serial number: 3d18dc4a<br />

Chapter 8. SSL connections to the <strong>Gateway</strong> daemon on z/OS 195

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!