David, 

We've had to do this a couple of times for a handful of our Java developer 
clients - as I recall, we googled our way to the solution pretty easily... 


But, from the wording of your message, it sound like you may be conflating a 
couple of different things. 


The certificate and key will be unique to the server, and for each client. The 
way to think about it: The 'key' file is the unique identity for each 'entity' 
in your environment, from which all else flows. 


The 'root' certificate may well be common to all entities; sounds like this is 
the case you are setting up. 


You may then specify - if your design dictates it - that each client 
certificate be _signed_ by the same root certificate. There are a few 
permutations in there, to be thought about. 


What you would _not_ be doing is using the same key(s) and cert(s) on both 
server and client(s). 


Did not see you at PG East last week? 


Lou Picciano 

----- Original Message ----- 
From: "David Patricola" <david.patric...@jefferson.edu> 
To: openssl-users@openssl.org 
Sent: Tuesday, March 29, 2011 1:16:03 PM 
Subject: Truststore or Cacerts file? 




I have a postgres server running in SSL, and set up the self-signed 
certificates and key on this box as well. I need to install these certificates 
on a client Java box’s (actually running ColdFusion 8) keystore. Out of 
postgresql.crt, root.crt and postresql.key, which files do I store? And do they 
go into the default cacerts file or create a truststore? 



David Patricola | Senior Cold Fusion Developer | Web Applications & Services | 
Jefferson Information Technologies 



Thomas Jefferson Universtiy | Philadelphia, PA | 215.503.1715 (Office) 

Reply via email to