diff --git a/README_SETUP.md b/README_SETUP.md index 554cd5dacbdffb637227e6be2b18ed1dad7877dc..8d16aa1ecc5b6d6ddb0c1c2bfec10620ff588428 100644 --- a/README_SETUP.md +++ b/README_SETUP.md @@ -67,11 +67,16 @@ server: 2. Create an SSL certificate somewhere with a `Java Key Store` file. For self-signed certificates (not recommended for production use) you can do: - `mkdir certificates; cd certificates` - - `keytool -genkey -keyalg RSA -alias selfsigned -keystore keystore.jks -validity 375 -keysize 2048 -ext san=dns:localhost` + - `keytool -genkey -keyalg RSA -alias selfsigned -keystore caosdb.jks -validity 375 -keysize 2048 -ext san=dns:localhost` Replace `localhost` by your host name, if you want. - - `keytool -importkeystore -srckeystore keystore.jks -destkeystore keystore.p12 -deststoretype PKCS12 -srcalias selfsigned` - - `openssl pkcs12 -in keystore.p12 -nokeys -out cert.pem` + - `keytool -importkeystore -srckeystore caosdb.jks -destkeystore caosdb.p12 -deststoretype PKCS12 -srcalias selfsigned` + - `openssl pkcs12 -in caosdb.p12 -nokeys -out cert.pem` - You can check the content of the certificate with `openssl x509 -in cert.pem -text` + + Alternatively, you can create a keystore from certificate files that you already have: + - `openssl pkcs12 -export -inkey privkey.pem -in fullchain.pem -out all-certs.pkcs12` + - `keytool -importkeystore -srckeystore all-certs.pkcs12 -srcstoretype PKCS12 -deststoretype pkcs12 -destkeystore caosdb.jks` + 3. Copy `conf/core/server.conf` to `conf/ext/server.conf` and change it appropriately: * Setup for MySQL back-end: Assuming that the mysql back-end is installed