To find the current certificate SKFS is using follow the following steps:
keytool -list -keystore /usr/local/strongkey/payara6/glassfish/domains/domain1/config/keystore.p12 -alias s1as -v
NOTE: The default keystore password is: “changeit”
Example output:
Enter keystore password:
Alias name: s1as
Creation date: Jun 14, 2024
Entry type: PrivateKeyEntry
Certificate chain length: 1
Certificate[1]:
Owner: CN=example.strongkey.com, OU=StrongKey FIDOServer
Issuer: CN=example.strongkey.com, OU=StrongKey FIDOServer
Serial number: c337fbdbf363ebaf
Valid from: Fri Jun 14 16:22:47 PDT 2024 until: Sat Jun 14 16:22:47 PDT 2025
Certificate fingerprints:
SHA1: F2:06:3B:7B:AA:96:22:BC:0E:98:A9:C3:07:09:CE:BE:E5:EC:DD:D6
SHA256: 15:C5:88:93:F5:66:67:2A:5D:4D:8F:30:46:16:06:1B:EF:44:17:BD:BD:C5:28:E6:B0:BC:34:A2:D9:76:CC:8C
Signature algorithm name: SHA256withRSA
Subject Public Key Algorithm: 2048-bit RSA key
Version: 3
Extensions:
#1: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 80 41 E0 FB EE 9E 0C 4D EE 82 E6 8F 5C 51 A1 8B .A.....M....\Q..
0010: B3 85 24 CC ..$.
]
]