Previous | Next | Trail Map | Security in JDK 1.2  | Exchanging Files

Import the Certificate as a Trusted Certificate

Suppose you are Ruth, and you have received from Stan Smith

Before you can use jarsigner to check the authenticity of the JAR file's signature, you need to import into your keystore the certificate from Stan.

Even though you (acting as Stan) actually created these files, and they haven't actually been transported anywhere, you can simulate being someone other than the creater and sender Stan. Acting as Ruth, type the following to create a keystore named ruthstore and import the certificate into an entry with an alias of "stan".

keytool -import -alias stan -file StanSmith.cer -keystore ruthstore
Since the keystore doesn't yet exist, it will be created. You will be prompted for a keystore password; type whatever password you want.

keytool will print out the certificate information and ask you to verify it, for example, by comparing the displayed certificate fingerprints with the fingerprints obtained from some other (trusted) source of information. (Each fingerprint is a relatively short number that uniquely and reliably identifies the certificate.) For example, in the real world, you might call up Stan and ask him what the fingerprints should be. He can get the fingerprints of the StanSmith.cer file he created by executing the command

keytool -printcert -file StanSmith.cer
If the fingerprints he sees are the same as the ones reported to you by keytool, the certificate has not been modified in transit. In that case, you let keytool proceed with placing a "trusted certificate" entry in the keystore. The entry contains the public key certificate data from the file StanSmith.cer, and is assigned the alias "stan".


Previous | Next | Trail Map | Security in JDK 1.2  | Exchanging Files