Getting the Certificate
To enable HTTPS web access, you will need a server certificate in a java keystore. To create a self-signed certificate,
for testing and non-production use, you can use the tool
keytool from your Java distribution. (A self-signed
certificate will cause a warning to be displayed by a browser when viewing the page. The various browsers each have
ways to import the certificate as a trusted one, for test purposes.)
The following command creates a self-signed certificate and adds it to a keystore,
% keytool -genkey -keyalg RSA -alias brooklyn \ -keystore <path-to-keystore-directory>/keystore.jks -storepass "mypassword" \ -validity 365 -keysize 2048 -keypass "password"
The passwords above should be changed to your own values. Omit those arguments above for the tool to prompt you for the values.
You will then be prompted to enter your name and organization details. This will use (or create, if it does not exist)
a keystore with the password
mypassword - you should use your own secure password, which will be the same password
used in your brooklyn.properties (below). You will also need to replace
<path-to-keystore-directory> with the full
path of the folder where you wish to store your keystore. The keystore will contain the newly generated key,
brooklyn and password
For production servers, a valid signed certificate from a trusted certifying authority should be used instead.
Typically keys from a certifying authority are not provided in Java keystore format. To create a Java keystore from
existing certificates (CA certificate, and public and private keys), you must first create a PKCS12 keystore from them,
for example with
openssl; this can then be converted into a Java keystore with
keytool. For example, with
a CA certificate
ca.pem, and public and private keys
key.pem, create the PKCS12 store
and then convert it into a keystore
keystore.jks as follows:
% openssl pkcs12 -export -in cert.pem -inkey key.pem \ -out server.p12 -name "brooklyn" \ -CAfile ca.pem -caname root -chain -passout pass:"password" % keytool -importkeystore \ -deststorepass "password" -destkeypass "password" -destkeystore keystore.jks \ -srckeystore server.p12 -srcstoretype PKCS12 -srcstorepass "password" \ -alias "brooklyn"
Configuring Brooklyn for HTTPS
How to do this depends on whether you are using the traditional or the Karaf distribution. See either of