• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

Enabling SSL support in JWS2.0

 
Greenhorn
Posts: 3
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi there,
How do I enable SSL support(https) in JWS2.0. I used the authstore utilility and created a new key (with the New certificate name ssl-RSA-default, 1024-bit key size, and the type as MD5-with-RSA and valid period of 90 days) all default. Now when I access the server with the address https://solaris2:7070/, the netscape throws up the error "Cannot communicate with server because there is no common encryption algorithms".
My administration console(at port 9090) shows that secure service is running perfectly. Still I get the same error when I try to access the secure service. But when I do the same steps for JWS1.1.3, ssl support is enabled perfectly. I dont know where or what I missed. Pls get me out of this.
Thanks in advance and regards,
P.Thanga Babu.
 
Greenhorn
Posts: 1
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
i had the same result to a different problem... perhaps this might help you out.
it turned out my keystore only had one entry in it... and it needed the trusted cert to work....
heres my keystore from scratch
------------
keytool -genkey -alias j2ee -keyalg RSA -keystore ./.keystore
/usr/local/ssl/misc/CA.sh -newca
/usr/local/ssl/misc/CA.sh -newcert
keytool -import -alias rug -file demoCA/cacert.pem -keystore ./.keystore
openssl x509 -in newreq.pem -out newreq2.pem
keytool -import -trustcacerts -file newreq2.pem

.hope this helps
reply
    Bookmark Topic Watch Topic
  • New Topic