Skip to Content
Java Security Handbook
book

Java Security Handbook

by Jamie Jaworski, Paul J. Perrone, Venkata S.R. Krishna Chaganti
September 2000
Intermediate to advanced
552 pages
12h 9m
English
Sams
Content preview from Java Security Handbook

Appendix F. Using the Keytool

This appendix shows how to use the keytool of the Java 2 Platform SDK. It provides an overview of the keytool's operation, describes the keytool commands, and provides examples of their use.

Overview

The keytool provides the capability to manage a keystore (see Chapter 6,"Key Management and Digital Certificates" ). A keystore is a container for key entries and trusted certificate entries. A key entry consists of a private key and an X.509 certificate chain that authenticates the associated public key. (The keytool does not provide support for symmetric (secret) keys.) A trusted certificate entry is a certificate that authenticates the public key of another party.

The keytool provides the following capabilities:

  • Key pair ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Java Security, 2nd Edition

Java Security, 2nd Edition

Scott Oaks
Java Security

Java Security

Scott Oaks
Java Cryptography

Java Cryptography

Jonathan Knudsen
TCP/IP Sockets in Java, 2nd Edition

TCP/IP Sockets in Java, 2nd Edition

Kenneth L. Calvert, Michael J. Donahoo

Publisher Resources

ISBN: 0672316021Purchase book