![]() Runmqckm -cert -list -db source.kdb -type cms -stashed You can then list the certs contained in both the kdb and the jks to compare and validate that all certs were copied over: If you add the flag '-stashed' it will eliminate the first password prompt. This will prompt for two passwords, the first is the password of the kdb file, the second is the password of the jks file. ![]() Runmqckm -cert -import -db source.kdb -type cms -target target.jks -target_type jks Import all certs from the source kdb file to the target jks file created above: This will prompt for a password that will be used to protect the jks file. Runmqckm -keydb -create -db target.jks -type jks You can build a Java Key Store (jks) from a source kdb file. You do not mention which version of the MQ client you are using, for the purpose of this answer I will assume you are using a MQ client 7.1 or later.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |