To use a new PKCS12 keystore, start by generating a Certificate Signing Request (CSR).
keytool -genkeypair -alias s1as -keystore newkeystore.p12 -storepass changeit -keypass changeit -keyalg RSA -keysize 2048 -sigalg SHA256withRSA -validity 365 -ext "SAN=DNS:blue.strongkey.com,DNS:red.strongkey.com,DNS:green.strongkey.com"
keytool -certreq -alias s1as -keyalg RSA -file certreq.csr -keystore newkeystore.p12 -ext SAN= DNS:blue.strongkey.com,DNS:red.strongkey.com,DNS:green.strongkey.com
In order to view the CSR, use the following command. Verify that the SAN extensions are present and correct.
keytool -printcertreq -file certreq.cs
Get the CSR signed by the external CA. Follow the instructions of the CA service provider to obtain the signed certificate.
After receiving the signed certificate chain from the CA service provider, proceed to the "Importing the Certificate (P12)" section.