-
Notifications
You must be signed in to change notification settings - Fork 20
Handling the Java Keystore
Alexander Wolf edited this page Oct 13, 2024
·
3 revisions
UDM saves its Captive Portal and WiFiman certificate in a Java Keystore. To check that cert, run command
keytool -list -v -storepass aircontrolenterprise -keystore /usr/lib/unifi/data/keystore
This should result in something like
~# keytool -list -v -keystore /usr/lib/unifi/data/keystore
Enter keystore password:
Keystore type: JKS
Keystore provider: SUN
Your keystore contains 1 entry
Alias name: unifi
Creation date: Jan 15, 2023
Entry type: PrivateKeyEntry
Certificate chain length: 1
Certificate[1]:
Owner: CN=unifi.example.com
Issuer: CN=R3, O=Let's Encrypt, C=US
Serial number: abcdef1234567890
Valid from: Sun Jan 15 16:26:52 CET 2023 until: Sat Apr 15 17:26:51 CEST 2023
Certificate fingerprints:
SHA1: ...
SHA256: ...
Signature algorithm name: SHA256withRSA
Subject Public Key Algorithm: 2048-bit RSA
plus a lot of more information.
The ubios-cert
script handles the certificate by its Alias name
, so typically unify
.