Hi Ujwol,
I ran this command and noticed the output as below (in the end).
Keystore contains 1 entry with Certificate chain length: 2.
Certificate 1 is not expired but Certificate 2 is in expired state.
So this looks like to be the issue, right ?
I have few queries from PKI perspective, if you can please help.
Will this expired certificate in the chain make this certificate completely unusable ?
Is there a way to remove this expired certificate chain and still have this certificate (Public/Private Key) valid and then import it in SiteMinder ?
Also, a brief history of this certificate import.
This certificate was originally in JKS format. From where I imported it to PKCS12 format using Keytool.
I just imported the specific alias which I needed.
keytool -importkeystore -alias TestCert -srckeystore Test.jks -destkeystore Test.p12 -destkeypass password -deststoretype PKCS12
Output:
Keystore type: PKCS12
Keystore provider: SunJSSE
Your keystore contains 1 entry
Alias name: ####
Creation date: ####
Entry type: PrivateKeyEntry
Certificate chain length: 2
Certificate[1]:
####Details####
Valid from: Still Valid
Signature algorithm name: SHA1withRSA
Certificate[2]:
####Details####
Valid from: EXPIRED Date
Signature algorithm name: MD5withRSA
Regards,
Anurag