Hi,
A - The first step is to generate a Keystore file -
1 - Open CMD as Admin ( right click on CMD -> Run As Administrator ) and navigate to NetFlowCentral\jre\bin directory
2 - Type -> keytool -keyalg RSA -keystore server.keystore -genkey -alias ServerKey
Once done enter the following information when asked for -
Enter keystore password: netflow
What is your first and last name? [starscream] //hostname of the server being worked upon
What is the name of your organizational unit? [Enterprise] //Enter org unit/LOB name
what is the name of your organization? [ZOHO] // from here, all the following fields are user defined
What is the name of your City or Locality? [Chennai]
What is the name of your State or Province? [TamilNadu]
What is the two-letter country code for this unit? [IN]
Is CN=starscream, OU=Enterprise, O=ZOHO, L=Chennai, ST=TamilNadu, C=IN correct?
[no]: yes
Enter key password for
(RETURN if same as keystore password):netflow
Re-enter new password:netflow
3 - This operation creates a KeyStore file named server.keystore in the current working directory which is %NetFlowCentral%\jre\bin\ directory
B - Now, a CSR file has to be generated -
1 - From the same CMD window, type -
keytool -keystore server.keystore -certreq -alias ServerKey -keyalg RSA -file self.csr
Enter keystore password:netflow
2 - Now, %NetFlowCentral%\jre\bin\self.csr file will be created.
C - Next is to import CA certificate to the Keystore -
we will be provided certificates depending on the CA and they are usually the root certificate, chained certificate and CA certificate. These certificates needs to be imported into the already generated keystore (in our case, server.keystore). The files needs to be imported to the keystore in the exact sequence as provided by the CA, the steps for which are below. The import should be done from %NetFlowCentral%\jre\bin\ directory.
Let's consider the file name to be - CARoot.cer . Copy it to the %NetFlowCentral%\jre\bin directory and execute the following command from the command prompt:
keytool -import -trustcacerts -keystore server.keystore -file CARoot.cer -alias Root
Once the command is executed, you will be prompted for password.
Enter keystore password:netflow
........
........
Trust this certificate? [no]:YES
D - Now to import chain certificates -
keytool -import -trustcacerts -keystore server.keystore -file chain.cer -alias Chain
Once the command is executed, you will be prompted for password.
Enter keystore password:netflow
If you receive more than one chained certificate from CA repeat the same procedure by replacing 'Chain' as 'Chain1' , 'Chain2 ' and etc.
E - Now, import the CA certificate -
keytool -import -keystore server.keystore -file CAcert.cer -alias ServerKey
[The same name and alias used when generating the keystore is to be used here]
F - Generate Trust certificate from the Server.Keystore -
keytool -export -alias ServerKey -file server.cer -keystore server.keystore
Once the command is executed we will be prompted for password.
Enter keystore password:netflow
For Distributed Edition:
G - Import Trust Certificate to Client.Keystore -
keytool -import -alias CentralKey -file server.cer -keystore client.keystore -noprompt
Once the command is executed we will be prompted for password.
Enter keystore password:netflow
Re-enter new password:netflow
where client.keystore is the user defined name for the keystore and CentralKey is the alias name. The name of the keystore is user defined and this exact name needs to be specified as detailed below.