

Open the file cert.txt and look for the line starting with “ Aliasname:“. To do so, run the following command: keytool -v -list -storetype pkcs12 -keystore d:\cert\wildcard.pfx > d:\cert\cert.txt In order to import the certificate, we first have to reveal the alias used.

Now we import the other two CA certificates the same way: keytool -import -trustcacerts -file "d:\cert\COMODORSAAddTrustCA.crt" -alias COMODORSAAddTrustCA -keystore d:\cert\wildcard.jks -storepass xxx keytool -import -trustcacerts -file "d:\cert\COMODORSAOrganizationValidationSecureServerCA.crt" -alias COMODORSAOrganizationValidationSecureServerCA -keystore d:\cert\wildcard.jks -storepass xxx Note: Please replace the “xxx” behind “-storepass” with a reasonable password. Since the key store doesn’t exist, it will create it automatically: keytool -import -trustcacerts -file "d:\cert\AddTrustExternalCARoot.crt" -alias AddTrustExternalCARoot -keystore d:\cert\wildcard.jks -storepass xxx The first command puts the root CA’s certificate into the keystore. Now, we’ll use the keytool command inside the java installation folder (in my case C:\Program Files\Java\jre1.8.0_201\bin to create the keystore and put all necessary files in there. COMODORSAOrganizationValidationSecureServerCA.crt.In my case the folder contained the following files: The certificate(s) of all intermediate CAs existing in the trust chain of the certificate.The certificate of the root CA of the certificate.

Copy the following files to this folder.Create a folder to collect all necessary files in.So, in order to fulfill this request, the following steps were necessary:
Java keystore explorer create new key store windows 10#
Since I use a Windows 10 workstation, I had to assure, that Java was installed, in my case version 1.8.
