LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Software
User Name
Password
Linux - Software This forum is for Software issues.
Having a problem installing a new program? Want to know which application is best for the job? Post your question in this forum.

Notices


Reply
  Search this Thread
Old 12-22-2017, 10:10 AM   #1
lob1
LQ Newbie
 
Registered: Dec 2017
Posts: 2

Rep: Reputation: Disabled
two way authentication


Hello,

I am setting up a server that will need to authenticate with two way authentication to another server that I do not manage. The other server is denying my connection, and their support simply states this:

"You have our cert, we have your cert. When you send the handshake over we acknowledge it and trust your cert, then return it for you to acknowledge and trust our cert. As long as you have our cert loaded in your keystore correctly, you should trust our cert and then the transaction can take place."

Where should I load his cert so that it is trusted?
 
Old 12-22-2017, 11:02 AM   #2
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Yawnstown, Ohio
Distribution: Mojave
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
"keystore" reference is a Java term.

Java is rather complex.
All I can offer is https://docs.oracle.com/javase/1.5.0...s/keytool.html

the tool is named keytool and that page at oracle says "Also manages certificates from trusted entities." and that is where you want to "be"

the keystore file can be anywhere and named anything.
See Import the Certificate as a Trusted Certificate for the ugly details.

Using a .cer (certificate) file in this example, it can be done using
Code:
keytool -import -alias susan -file Example.cer -keystore exampleraystore
I'd keep a terminal open and get comfy with the keytool command.

Sorry, wish I had more.
 
Old 12-22-2017, 11:38 AM   #3
lob1
LQ Newbie
 
Registered: Dec 2017
Posts: 2

Original Poster
Rep: Reputation: Disabled
That's what confused me. We arent using Java, though. This is basically a LAMP stack that is being used as a reverse proxy. What would be the process considering that? Thank you for your help!
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] Icecast 2.4 - Listener Authentication - Failed to open authentication database: Permission denied glupa4e Slackware 2 07-22-2017 02:53 PM
Can't login as root - Debian 8.5 - authentication failed. remaining authentication methods 'publickey password' LnxRider Debian 11 07-31-2016 12:06 AM
PAM Authentication failure Authentication token no longer valid, allowed in anyway quikster Linux - Server 1 03-12-2015 03:37 AM
configure ssh authentication using password file and sftp/scp authentication using ld cameliab Linux - Software 1 08-29-2011 04:28 AM
Authentication service cannot retrieve authentication info - for new user yosial Linux - Newbie 2 10-29-2008 12:30 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Software

All times are GMT -5. The time now is 05:37 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration