LogoLogo
TPI.devCommunityGithub
  • Overview
    • Introduction
      • Future Features
    • License & Disclaimer
    • APIM Architecture
      • Production Deployments and Capacity
      • Functions
      • Integration
    • Key Concepts
      • API Group
      • API Scope
      • API Client
      • End-to-End Workflow Combining API Group, API Scope, and API Client
        • Scenario: API Management for an E-commerce Platform
    • Support
    • Glossary
    • Scenarios
      • Financial Industry
        • Transforming Financial Services with digiRunner API Management
        • Redefining Financial Data Migration with digiRunner API Management Platform
      • Manufacturing Industry
        • Enabling Smart Manufacturing with Seamless API Integration and Automation via digiRunner
        • Streamlining Global Operations with API Management via digiRunner
      • Medical Industry
        • Enhancing Healthcare Data Integration and Security with digiRunner API Management
        • Revolutionizing Healthcare Interoperability with digiRunner’s Advanced API Framework
      • Insurance Industry
        • Modernizing Insurance Services with digiRunner API Management
        • Modernizing Insurance with digiRunner—Bridging Legacy Systems and Microservices
      • Government and Public Services
        • Empowering Open Government Services with digiRunner: A Mission for Integration and Transformation
        • Streamlining Public Sector Innovation via digiRunner: Driving Citizen-Centric Digital Transformation
  • Get Started
    • Installing digiRunner API Management
      • SMTP Configuration
    • Registering Your First APIs with digiRunner
    • Client Authorization and Calling APIs
    • Rate Limiting
    • Proxy Caching
    • Load Balancing
    • Sandbox Testing
    • VIP Gateway Priority Settings
    • JWE Certificate
  • Configuring IP Whitelisting via IP Binding
  • Most common use cases
    • Obtaining API Keys and Calling APIs
    • API IP Diversion
    • Viewing Real-time API Logs
    • Enabling APIs and No Auth in Batches with API Imported
    • Role-Based Access Management within a Hierarchical Structure
    • Simplified OIDC Login with Predefined Organizational Frameworks
    • Resetting User Password and Confirmation Email for Admin Console User
  • Guide
    • AC User Management
      • Users
      • My Profile
      • Roles
      • Role Mapping
      • Organization
      • Role & txID
      • Delegate AC User
      • AC OAuth 2.0 IdP
      • AC LDAP IdP
      • AC MLDAP IdP
      • AC API IdP
    • Development Mode
      • Function Management
      • Rtn Code Management
      • Embedded Function Management
    • Client Management
      • API Client
      • API Group
      • API Scope
      • Authentications
      • Security Level
      • GTW OAuth 2.0 IdP
      • GTW LDAP IdP
      • GTW API IdP
      • GTW JDBC IdP
      • Client Export/Import
    • API Management
      • API List
      • API Registry
      • API Test
      • API Modify Batch
    • Monitor & Alert
      • digiRunner Server
      • Alert Settings
    • Reports
      • API Calls
      • API RESP distribution
      • API Avg. RESP Time
      • API GTW traffic
      • Bad Attempt Report
    • Certificate Management
      • JWE Cert. List
      • JWE Cert. Management
      • TLS Cert. List
      • TLS Cert. Management
    • Application Forms
      • API Key
      • Applications
      • Approval Flow Settings
    • System Information
      • API Key Approval History
      • Scheduled Tasks
      • Recurring Tasks
      • Mail Log
    • System Configs
      • Setting
      • Items
      • Files
      • Customer Setting
      • Online Console
      • WebSocket Proxy Management
      • Static Webpage Reverse Proxy
      • RDB Connection
      • Mail Template Export/Import
  • API Integration Guide
    • Using Token for Authentication and Authorization
      • OpenID Connect (OIDC) Mode
      • Client Credentials Mode
      • Password Mode
    • Using X API Key for Authentication and Authorization
      • Applying for X API Key
      • Obtaining X API Key
      • Calling APIs Registered in digiRunner with X API Key
    • Using API Key for Authentication and Authorization
      • Applying for API Key
      • Obtaining API Key and Secret Key
      • Calculating the Signature and DGRK
      • Calling APIs Registered in digiRunner with API Key
    • Using HTTP Basic and OAuth for Authentication and Authorization
      • Calling APIs Registered in digiRunner with Basic Auth
      • Calling APIs Registered in digiRunner with No OAuth
    • Token Lifecycle Management Mechanism
      • Applying Refresh Token
      • Token Revocation
      • Token Introspection
    • JWS/JWE Integration
      • JWS Workflow
      • JWE Workflow
      • Exchanging Public Keys
      • Generating Certificate
      • Operating with JWS
      • Operating with JWE
Powered by GitBook
On this page

Was this helpful?

Export as PDF
  1. API Integration Guide
  2. JWS/JWE Integration

Generating Certificate

PreviousExchanging Public KeysNextOperating with JWS

Was this helpful?

Replace example-pwd123 with your custom password and example-comp with your custom certificate name in the commands below.

  1. Issue the command to create a jks file using keytool.

keytool -genkey -alias example-comp -keystore example-comp.jks -keypass example-pwd123 -storepass example-pwd123 -keyalg RSA -keysize 2048 -validity 365 -v -dname "CN=www.example.com, OU=dgr, O=tpi, L=taipei, ST=taiwan, C=tw" -ext "SAN=DNS: www.example.com,IP:127.0.0.1"
  1. Query the content of the jks file.

keytool -list -v -keystore example-comp.jks -storepass example-pwd123
  1. Generate a keystore in p12 format, and provide a password.

keytool -importkeystore -srckeystore example-comp.jks -destkeystore example-comp.p12 -srcstoretype jks -deststoretype pkcs12 -keypass example-pwd123 -storepass example-pwd123
  1. Convert the file online, from P12 to PEM:

  • Go to .

  • In the Certificate File to Convert field, click Choose File to select and upload the *.p12 file.

  • In the PFX Password field, enter your password.

  • Click Convert Certificate to finish the conversion.

The generated PEM file, such as example-comp.pem, contains both the private key and the certificate (including the public key). The content is as follows:

Bag Attributes
    friendlyName: example-comp
    localKeyID: 54 69 6D 65 20 31 36 38 38 36 32 32 38 33 31 36 31 35 
Key Attributes: <No Attributes>
-----BEGIN PRIVATE KEY-----
MIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQDH7L/+gfoj4cDT
1OXSxlNaasm9FFr8A904A1NISKVU2MQN8+JfEpnyId0jHmqypTN1RBvQ0ET326Gg
HPsYbIulQ+5viT5IObCwaBf8IsVs+ej30ao5F4oI4GIpirsPzAmrLD3Z2Q/f6y2T
drlg3HxO9QDGbsO5WME+1rRuG5V6MHP4XxzJFumSlaxVYungghYnyNdy1qq0Xb37
JSPbhqYBC00J6uK66CH9qpN5o3j/ObFvaENreDTAtfWM9md9W44thPU6ERwjFpW5
NB9P3et3ZRgA8TYPwKN6OP84Vt9dEKIM1RjZMO4wDz2SbuugZimDIXox2DfFhKfC
zDYtdDVhAgMBAAECggEBAL5wy0LI1VowxdoDRxlMSkIqzxkJttGxbJzarg6BBNyZ
z8fqtYwS0ApSL7AwXTrnGultg4GZotjnokI+2QEfBLbcytf8SBPMwH6J6a8IAEAa
nszSL/BKd/aUp20i9aXKmrsvXYuStQh7oeKCiXu3C8K6p45eHJsF7K7LHvxz0iOd
LHeS/Dkl+NRYh+h46hoX4BLxNlTByzmz7Jm/ujtTNd/Qfe2E8N6mHXXuXol+2xV5
5fyUr3Ru0qijD1OYbM+mncdztATF7Vdp4VipgxyndtU7a/H3NLes4Hvat0Gg50Pl
UCdrOMNpnw6tWoHMJ4FJcmMaSPLBhkrSHBCqNXRFv3ECgYEA7taRQN6YPgEnuKaJ
toXEA9E06BNPe3HvTJPxpIZuBGpnqk8ojMTu+BghuTu0oYzacNzz2rYkZb5VMDpY
NJ33VNqexviNAcQrC4oQJHhRqtavmpyEAx4DK3IG7Cad1cejbi9xp7rR5xmEabHo
vDxDn9tI4D3Wg7NdvOM9yMoZiccCgYEA1kpe6SLc0JBCYn8x1M/u3II8swCe0j2g
/L0mp2zK4GYs41Dd3c+xbu+sGbSNke4P8kmMnpqIODg88m+rI5GDTTIWV32oT9rp
qq8rehY2d6gY74z+kR4vd+XVtqMzDg70CMFGxNQGA/QxZOo5SHLo9wLx7V+/RHKh
2GicENlkh5cCgYEApDpWVsy40qnorkeVmjQQvK82Of5NQQzvBzETj5YAQHkKH0mf
EGy6BU5SohQz+IHqEoFcDKACFxPxb+Aulr+oOmi5lQeDrhs9ngmpX+p7/YTx6taE
z7/rXgxiRi+niEBmWHW3KSaE/uvE6Qi0h/rIZTtbuRXMU3Mama+H5HFTbjECgYEA
yQdB3IIpFruOm2pprBRZJ6JCIUcet2q7YP5tiblE5ZjU2XdefBzAfqr3D7JS8Sic
6xXWhl/AFMWlX2Yk7ZwvyjaHwRIP2MIsXUQxjDnUZRJcOjZSBn+D1n3VrJ2TYsfi
ZWgz5Khm8ESgJeSZUn8CT+ACZ0ZgX20Oqb8RUbkvVwcCgYAykFnVF4xf842XONao
rSEWhdXARC6vZ3UySZpiqjSVxpxY2KLVL0HM37XBMsrhyaNji7OZiPGq3FSMunFD
3TOICYfcfl0dVKxcxEEv50UMSPREq2ixDOL5kpl5KA7ogkWA+/5gvl+BA1pcWArg
9H1ux9hYncY/2DzIpBUDfhczpA==
-----END PRIVATE KEY-----
Bag Attributes
    friendlyName: example-comp
    localKeyID: 54 69 6D 65 20 31 36 38 38 36 32 32 38 33 31 36 31 35 
subject=C = tw, ST = taiwan, L = taipei, O = tpi, OU = dgr, CN = www.tpisoftware.com

issuer=C = tw, ST = taiwan, L = taipei, O = tpi, OU = dgr, CN = www.tpisoftware.com
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
  1. Retain only the data of the certificate (including the public key), such as example-comp-pub.pem. The content is as follows:

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
  1. Upload the data of the certificate (including the public key), such as example-comp-pub.pem. to digiRunner.

SSL Shopper