tomcat配置ssl双向认证

接上篇tomcat ssl单向认证 http://qerooy.iteye.com/blog/2252786,本文在单向认证的基础上完成双向认证配置。

1、使用以下命令生成客户端证书,并将此证书安装到客户端(此证书请安装到个人目录下);
keytool -genkey -v -alias client1 -keyalg RSA -storetype PKCS12 -keysize 1024 -validity 365 -keystore "F:\cert\client1.p12"

在此密码录入为123456


2、从客户端p12证书导出cer证书;
keytool -export -alias client1 -storetype PKCS12 -keystore "F:\cert\client1.p12" -storepass 123456 -rfc -file "F:\cert\client1.cer"


3、让服务端信任客户端证书,复制原单向认证文件为tomcat_double.keystore,将client1.cer导入到服务器证书库中;
keytool -import -alias client1 -v -file "F:\cert\client1.cer" -keystore "F:\cert\tomcat_double.keystore"



可通过如下命令检查证书情况
keytool -list -keystore "F:\cert\tomcat_double.keystore"


4、更改配置文件server.xml,将单向认证改为双向认证;
<Connector port="443" protocol="org.apache.coyote.http11.Http11Protocol"
               maxThreads="150" SSLEnabled="true" scheme="https" secure="true"
               clientAuth="false" sslProtocol="TLS" 
               keystoreFile="F:\cert\tomcat.keystore" keystorePass="123456" />

修改为
<Connector port="443" protocol="org.apache.coyote.http11.Http11Protocol"
               maxThreads="150" SSLEnabled="true" scheme="https" secure="true"
               clientAuth="true" sslProtocol="TLS" 
               keystoreFile="F:\cert\tomcat_double.keystore" keystorePass="123456"
               truststoreFile="F:\cert\tomcat_double.keystore" truststorePass="123456" />


5、配置完成后,重启tomcat,访问便可看到提示需要证书;



猜你喜欢

转载自qerooy.iteye.com/blog/2253067