I have a .p12 file. I converted this this a .pem file. openssl pkcs12 -in my.p12 -out mynew.pem -passin pass:custpasswo I then created the trust store with the .pem files created previously curl -X POST -H "Content-Type: text/xml" -d '<KeyStore name=“my-store"/>' https://api.enterprise.apigee.com/v1/organizations/{myorg}/environments/{mye}/keystores. I then uploaded the file curl -X POST -H "Content-Type: multipart/form-data" -F file="@mypemfile.pem" https://api.enterprise.apigee.com/v1/organizations/{myorg}/environments/{mye}/keystores/my-store/cer.... I added is to my Target definition <SSLInfo> <Enabled>true</Enabled> <ClientAuthEnabled>true</ClientAuthEnabled> <KeyStore>my-store</KeyStore> <KeyAlias>my-store-alias</KeyAlias> <TrustStore>my-store</TrustStore> </SSLInfo> I am unable to deploy this with error "Target default has invalid keyalias reference my-store-alias."
Dear @rajeev@apigee.com,
Please refer to this link for more information how to create Keystore and Truststore.
Thanks,
Amar
The main question you have to ask is this. Is the cert self signed?
If the answer is yes then you have to create a Keystore and upload the jar.
If all you have is the .p12 file, then you have to generate the .cert and the .key files which you can using the following steps
Exporting cert: -
openssl pkcs12 -in mycertfilename.p12 -nokeys -out cert.pem
Exporting Key:
openssl rsa -in key.pem -out server.key
Now follow the steps laid out in the documentation - http://docs.apigee.com/api-services/content/keystores-and-truststores#createakeystore.