Skip to content

Handling the Java Keystore

Alexander Wolf edited this page Oct 13, 2024 · 3 revisions

UDM saves its Captive Portal and WiFiman certificate in a Java Keystore. To check that cert, run command

keytool -list -v -storepass aircontrolenterprise -keystore /usr/lib/unifi/data/keystore

This should result in something like

~# keytool -list -v -keystore /usr/lib/unifi/data/keystore
Enter keystore password:  
Keystore type: JKS
Keystore provider: SUN

Your keystore contains 1 entry

Alias name: unifi
Creation date: Jan 15, 2023
Entry type: PrivateKeyEntry
Certificate chain length: 1
Certificate[1]:
Owner: CN=unifi.example.com
Issuer: CN=R3, O=Let's Encrypt, C=US
Serial number: abcdef1234567890
Valid from: Sun Jan 15 16:26:52 CET 2023 until: Sat Apr 15 17:26:51 CEST 2023
Certificate fingerprints:
	 SHA1: ...
	 SHA256: ...
Signature algorithm name: SHA256withRSA
Subject Public Key Algorithm: 2048-bit RSA 

plus a lot of more information.

The ubios-cert script handles the certificate by its Alias name, so typically unify.