top-image

LATEST ARTICLES

Hello,

After my first post concerning the SSL and the tool PorteCle (http://www.javablog.fr/java-ssl-generate-keystore-self-signed-certificate-tool-portecle.html) allowing the generation of KeyStore, self-signed certificate instead of Keytool supported in the JDK / JRE, I would like to present a new tool KeyStore Explorer.

KeyStore Explorer is an open source GUI replacement for the Java command-line utilities keytool and jarsigner. KeyStore Explorer presents their functionality, and more, via an intuitive graphical user interface.

https://keystore-explorer.org/

https://keystore-explorer.org/downloads.html


JAVA CACERTS truststore

First, a truststore is used to authenticate peers. A keystore contains private keys of the clients and is used to authenticate yourself.

So, there is also a truststore ‘cacerts‘ used to authenticate the java process executed in JVM using the JDK. Java stores in this truststore the public certificates of root CAs. Java uses cacerts to authenticate java processes with remote servers (example during a proxies generation via WSDL). You could add the certificat of remote servers in the ‘cacerts‘ truststore.

The Java ‘cacerts‘ truststore is a file accessible in the folder $JAVA_HOME\jre\lib\security (ex: C:\SDK\jdk1.X.Y_ZZ\jre\lib\security).


It is protected by a default password (ex: “changeit” or “changeme”) which could be modified by the following commands:

Add -storepass to keytool arguments.
$JAVA_HOME/bin/keytool -storepasswd -storepass '' -keystore mykeystore.jks

But also notice that -list command does not always require a password. I could execute follow command in both cases: without password or with valid password

$JAVA_HOME/bin/keytool -list -keystore $JAVA_HOME/jre/lib/security/cacerts



Best regards,

Huseyin OZVEREN

This content is password protected. To view it please enter your password below:

This content is password protected. To view it please enter your password below:

Hello,

Just a post to add a script to install DAR/docapp to Documentum found on linkedin https://www.linkedin.com/feed/update/urn:li:activity:6498895995227766784 added by Alex Vais:

# Variables:
ENV=<Per_ENV>
SPECIFICDATE=`date +"%Y%m%d_%H%M%S"`
WORKINGDIRECTORY=$HOME/tmp/eitan/sandbox/dar_install
DOCAPPLOGFILE=$WORKINGDIRECTORY/log_file_$VAR.log
DARFILE=$WORKINGDIRECTORY/dar_filelist.log
SCRIPTFOLDER=$HOME/scripts
location1=$HOME/tmp/dar_install
location2=$HOME/dba/config/xxxxxxxxx/server.ini
LOG=$HOME/tmp/eitan/sandbox/dar_install/logs/dar_run_`date +"%Y%m%d"`.log
MSG=$HOME/tmp/eitan/sandbox/dar_install/logs/dar_run_`date +"%Y%m%d"`.msg
MAILTO="xxxxxxxxx@xxxxxxxx.xx.xx.xx.xxx"
WHATTOCHECK1="was successfully installed"

# Get Username:
export username=`whoami`; echo $username

# Get Docbase name:
export docbase1=`grep "docbase_name = " $location2 | awk '{print $NF}'`; echo $docbase1

# Get Docbase password:
export PASSWORD=` cat $SCRIPTFOLDER/.pwd_$docbase1`; echo $PASSWORD
echo " " > $LOG
echo " " > $MSG

cd $WORKINGDIRECTORY

ls -1 *.dar > $DARFILE

for VAR in `cat $DARFILE`
do
java -Dant_extended_lib_dir=$HOME/product/7.2/install/composer -Ddars=$VAR -Dlogpath=$LOG -Ddi_log=$DOCAPPLOGFILE -Ddocbase=$docbase1 -Duser=$username -Dpassword=$PASSWORD -Ddomain= -cp $HOME/product/7.2/install/composer/ComposerHeadless/startup.jar org.eclipse.core.launcher.Main -data $HOME/product/7.2/install/composer/workspace/ -application org.eclipse.ant.core.antRunner -buildfile $HOME/product/7.2/install/composer/deploy.xml deployAll
done

echo " $SPECIFICDATE Verification stage "

if grep -Fxq "$WHATTOCHECK1" $LOG
then
echo "$SPECIFICDATE DocApp was installed " >> $LOG 
else
echo "Check log file and run the process again" 
exit 0

fi

cat $LOG >> $MSG

mailx -s "$SPECIFICDATE Deployment of DAR file(s) to $ENV finished, here are the results;" $MAILTO < $MSG

echo " " > $LOG
echo " " > $MSG
echo " " > $DARFILE



Best regards,

Huseyin OZVEREN

Page 1 of 54:1 2 3 4 »Last »
bottom-img
Copyright ® 2012 Huseyin Ozveren. No reproduction, even partial, can be used from this site and all its contents including text, documents, images, etc.. without the express permission of the author.