<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OnCommand API Services use ca-issued certificate with non-default password in Software Development Kit (SDK) and API Discussions</title>
    <link>https://community.netapp.com/t5/Software-Development-Kit-SDK-and-API-Discussions/OnCommand-API-Services-use-ca-issued-certificate-with-non-default-password/m-p/137862#M2574</link>
    <description>&lt;P&gt;Hi all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;LIttle correction for step [6].&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[6] Generate new keystore "keystore.jks" and key pair&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;[6]# keytool -genkey -alias hostname -keyalg RSA -keystore keystore.jks -keysize 2048&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;keytool -genkey -alias hostname -keyalg RSA -keystore keystore.jks -keysize 2048&lt;BR /&gt;Enter keystore password:&lt;BR /&gt;Re-enter new password:&lt;BR /&gt;What is your first and last name?&lt;BR /&gt;[Unknown]: hostname.domain.com&lt;BR /&gt;What is the name of your organizational unit?&lt;BR /&gt;[Unknown]:&lt;BR /&gt;What is the name of your organization?&lt;BR /&gt;[Unknown]: COMPANY&lt;BR /&gt;What is the name of your City or Locality?&lt;BR /&gt;[Unknown]: CITY&lt;BR /&gt;What is the name of your State or Province?&lt;BR /&gt;[Unknown]:&lt;BR /&gt;What is the two-letter country for this unit?&lt;BR /&gt;[Unknown]: CX&lt;BR /&gt;Is CN=hostname.domain.com, OU=Unknown, O=COMPANY, L=CITY, ST=Unknown, C=CX correct?&lt;BR /&gt;[no]: yes&lt;/P&gt;
&lt;P&gt;Enter key password for &amp;lt;hostname&amp;gt;&lt;BR /&gt;(RETURN if same as keystore password): &lt;STRONG&gt;&amp;lt;KEY_PASSWORD&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 06 Feb 2018 14:46:40 GMT</pubDate>
    <dc:creator>Ladislav_Hajzer</dc:creator>
    <dc:date>2018-02-06T14:46:40Z</dc:date>
    <item>
      <title>OnCommand API Services use ca-issued certificate with non-default password</title>
      <link>https://community.netapp.com/t5/Software-Development-Kit-SDK-and-API-Discussions/OnCommand-API-Services-use-ca-issued-certificate-with-non-default-password/m-p/134041#M2453</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to use a ca-issued certificate instead of a self-signed certificate.&lt;/P&gt;&lt;P&gt;If I use a Java Keystore File (JKS) with the default password 'changeit' everything works as expected, but if I'm trying to use a non-default password I get the following error&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;2017-08-23 14:40:05,233 ERROR [org.jboss.msc.service.fail] (MSC service thread 1-4) MSC000001: Failed to start service jboss.server.controller.management.security_realm.SSLRealm.key-manager: org.jboss.msc.service.StartException in service jboss.server.controller.management.security_realm.SSLRealm.key-manager: JBAS015229: Unable to start service
at org.jboss.as.domain.management.security.FileKeystore.load(FileKeystore.java:154)
at org.jboss.as.domain.management.security.FileKeyManagerService.start(FileKeyManagerService.java:119)
at org.jboss.msc.service.ServiceControllerImpl$StartTask.startService(ServiceControllerImpl.java:1948) [jboss-msc-1.2.2.Final.jar:1.2.2.Final]
at org.jboss.msc.service.ServiceControllerImpl$StartTask.run(ServiceControllerImpl.java:1881) [jboss-msc-1.2.2.Final.jar:1.2.2.Final]
at java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source) [rt.jar:1.8.0_73]
at java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source) [rt.jar:1.8.0_73]
at java.lang.Thread.run(Unknown Source) [rt.jar:1.8.0_73]
Caused by: java.io.IOException: Keystore was tampered with, or password was incorrect
at sun.security.provider.JavaKeyStore.engineLoad(Unknown Source) [rt.jar:1.8.0_73]
at sun.security.provider.JavaKeyStore$JKS.engineLoad(Unknown Source) [rt.jar:1.8.0_73]
at sun.security.provider.KeyStoreDelegator.engineLoad(Unknown Source) [rt.jar:1.8.0_73]
at sun.security.provider.JavaKeyStore$DualFormatJKS.engineLoad(Unknown Source) [rt.jar:1.8.0_73]
at java.security.KeyStore.load(Unknown Source) [rt.jar:1.8.0_73]
at org.jboss.as.domain.management.security.FileKeystore.load(FileKeystore.java:113)
... 6 more
Caused by: java.security.UnrecoverableKeyException: Password verification failed
... 12 more&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to the Installation and Setup Guide, configuring&lt;STRONG&gt;&amp;nbsp;/opt/netapp/essentials/jboss/standalone/configuration/standalone.xml&lt;/STRONG&gt; should be enough&lt;/P&gt;&lt;PRE&gt;&amp;lt;system-properties&amp;gt;
    &amp;lt;property name="apiserver.keystore.keypassword" value="NEW_PASSWORD" /&amp;gt;
    &amp;lt;property name="apiserver.keystore.storepassword" value="NEW_PASSWORD" /&amp;gt;
&amp;lt;/system-properties&amp;gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I was getting the above error, I've tried changing password in&amp;nbsp;&lt;STRONG&gt;/opt/netapp/api-server/api-tools/config/keystore-config.properties&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;apiserver.keystore.keypassword="NEW_PASSWORD"
apiserver.keystore.storepassword="NEW_PASSWORD"&lt;/PRE&gt;&lt;P&gt;and added this in&lt;STRONG&gt;&amp;nbsp;/opt/netapp/essentials/jboss/standalone/configuration/standalone.xml&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;&amp;lt;security-realm name="SSLRealm"&amp;gt;
    &amp;lt;server-identities&amp;gt;
        &amp;lt;ssl&amp;gt;
            &amp;lt;keystore path="apiservice/keystore.jks" relative-to="jboss.server.config.dir" keystore-password="NEW_PASSWORD" key-password="NEW_PASSWORD" alias="server"/&amp;gt;
        &amp;lt;/ssl&amp;gt;
    &amp;lt;/server-identities&amp;gt;
&amp;lt;/security-realm&amp;gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe someone managed to get it working and can help me out &lt;IMG id="smileyfrustrated" class="emoticon emoticon-smileyfrustrated" src="https://community.netapp.com/i/smilies/16x16_smiley-frustrated.png" alt="Smiley Frustrated" title="Smiley Frustrated" /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 14:40:02 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Software-Development-Kit-SDK-and-API-Discussions/OnCommand-API-Services-use-ca-issued-certificate-with-non-default-password/m-p/134041#M2453</guid>
      <dc:creator>acjackson</dc:creator>
      <dc:date>2025-06-04T14:40:02Z</dc:date>
    </item>
    <item>
      <title>Re: OnCommand API Services use ca-issued certificate with non-default password</title>
      <link>https://community.netapp.com/t5/Software-Development-Kit-SDK-and-API-Discussions/OnCommand-API-Services-use-ca-issued-certificate-with-non-default-password/m-p/137792#M2569</link>
      <description>&lt;P&gt;&lt;SPAN&gt;==========================================================================&lt;/SPAN&gt;&lt;BR /&gt;CONTAINER - Generate SSL CSR&lt;BR /&gt;&lt;SPAN&gt;==========================================================================&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[1] By Default, the SSL certificate named keystore.jks is in the directory /opt/netapp/essentials/standalone/configuration/apiservice/&lt;BR /&gt;[2] Create backup of original keystore file&lt;BR /&gt;[3] Remove original keystore file&lt;BR /&gt;[4] Change default password for keystore file in keystore configuration file&lt;BR /&gt;[5] Change default password for keystore file in JAVA application "Netapp API services"&lt;BR /&gt;[6] Generate new keystore "keystore.jks" and key pair&lt;BR /&gt;[7] List content of the keystore "keystore.jks"&lt;BR /&gt;[8] Generate CSR For Private Key (alias) "hostname"&lt;BR /&gt;&lt;SPAN&gt;==========================================================================&lt;/SPAN&gt;&lt;BR /&gt;[1]# cd /opt/netapp/essentials/jboss/standalone/configuration/apiservice/&lt;BR /&gt;[2]# cp ./keystore.jks ./keystore.jks.old&lt;BR /&gt;[3]# rm ./keystore.jks&lt;BR /&gt;[4]# vi /opt/netapp/api-server/api-tools/config/keystore-config.properties&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;apiserver.keystore.keypassword=&amp;lt;KEY_PASSWORD&amp;gt;&lt;BR /&gt;apiserver.keystore.storepassword=&amp;lt;KEYSTORE_PASSWORD&amp;gt;&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;[5]# vi /opt/netapp/essentials/jboss/standalone/configuration/standalone-full.xml&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;...&lt;BR /&gt;&amp;lt;system-properties&amp;gt;&lt;BR /&gt;&amp;lt;property name="apiserver.keystore.keypassword" value="&amp;lt;KEY_PASSWORD&amp;gt;"/&amp;gt;&lt;BR /&gt;&amp;lt;property name="apiserver.keystore.storepassword" value="&amp;lt;KEYSTORE_PASSWORD&amp;gt;"/&amp;gt;&lt;BR /&gt;&amp;lt;/system-properties&amp;gt;&lt;BR /&gt;...&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;[6]# keytool -genkey -alias hostname -keyalg RSA -keystore keystore.jks -keysize 2048&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;keytool -genkey -alias hostname -keyalg RSA -keystore keystore.jks -keysize 2048&lt;BR /&gt;Enter keystore password:&lt;BR /&gt;Re-enter new password:&lt;BR /&gt;What is your first and last name?&lt;BR /&gt;[Unknown]: hostname.domain.com&lt;BR /&gt;What is the name of your organizational unit?&lt;BR /&gt;[Unknown]:&lt;BR /&gt;What is the name of your organization?&lt;BR /&gt;[Unknown]: COMPANY&lt;BR /&gt;What is the name of your City or Locality?&lt;BR /&gt;[Unknown]: CITY&lt;BR /&gt;What is the name of your State or Province?&lt;BR /&gt;[Unknown]:&lt;BR /&gt;What is the two-letter country for this unit?&lt;BR /&gt;[Unknown]: CX&lt;BR /&gt;Is CN=hostname.domain.com, OU=Unknown, O=COMPANY, L=CITY, ST=Unknown, C=CX correct?&lt;BR /&gt;[no]: yes&lt;BR /&gt;&lt;BR /&gt;Enter key password for &amp;lt;hostname&amp;gt;&lt;BR /&gt;(RETURN if same as keystore password): ENTER&lt;BR /&gt;&lt;BR /&gt;Warning:&lt;BR /&gt;The JKS keystore uses a proprietary format. It is recommended to migrate to PKCS12 which is an industry standard format using "keytool -importkeystore -srckeystore keystore.jks -destkeystore keystore.jks -CXststoretype pkcs12".&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;[7]# keytool -list -v -keystore keystore.jks&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;[8]# keytool -certreq -alias hostname -file hostname.csr -keystore keystore.jks&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;==========================================================================&lt;/SPAN&gt;&lt;BR /&gt;CONTAINER - Import Root/CA certificates&lt;BR /&gt;&lt;SPAN&gt;==========================================================================&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;!!! NOTE !!!&lt;BR /&gt;If Root/CA certificates are already exists in system-wide CA keystore ($JAVA_HOME/jre/lib/security/cacerts),&lt;BR /&gt;then we don't need to do this. In our case we need only step [2].&lt;BR /&gt;!!! NOTE !!!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[1] Import CA certificate "CA1" to keystore "keystore.jks"&lt;BR /&gt;[2] Import CA certificate "CA2" to keystore "keystore.jks"&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;# /opt/netapp/essentials/jboss/standalone/configuration/apiservice/&lt;BR /&gt;[1]# keytool -importcert -trustcacerts -file CA1.crt -alias CA1 -keystore keystore.jks&lt;BR /&gt;[2]# keytool -importcert -trustcacerts -file CA2.crt -alias CA2 -keystore keystore.jks&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;==========================================================================&lt;/SPAN&gt;&lt;BR /&gt;CONTAINER - Import signed SSL certificate&lt;BR /&gt;&lt;SPAN&gt;==========================================================================&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Import signed SSL certificate to keystore "keystore.jks"&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;# /opt/netapp/essentials/jboss/standalone/configuration/apiservice/&lt;BR /&gt;# keytool -importcert -trustcacerts -file hostname.crt -alias hostname -keystore keystore.jks&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Restart API services&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;# /etc/init.d/apiserver restart&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;LINKz&lt;BR /&gt;&lt;SPAN&gt;==========================================================================&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;2014 - Java Keytool Essentials: Working with Java Keystores&lt;BR /&gt;&lt;A href="https://www.digitalocean.com/community/tutorials/java-keytool-essentials-working-with-java-keystores" target="_blank"&gt;https://www.digitalocean.com/community/tutorials/java-keytool-essentials-working-with-java-keystores&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2008 - The Most Common Java Keytool Keystore Commands&lt;BR /&gt;&lt;A href="https://www.sslshopper.com/article-most-common-java-keytool-keystore-commands.html" target="_blank"&gt;https://www.sslshopper.com/article-most-common-java-keytool-keystore-commands.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 15:52:39 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Software-Development-Kit-SDK-and-API-Discussions/OnCommand-API-Services-use-ca-issued-certificate-with-non-default-password/m-p/137792#M2569</guid>
      <dc:creator>Ladislav_Hajzer</dc:creator>
      <dc:date>2018-02-01T15:52:39Z</dc:date>
    </item>
    <item>
      <title>Re: OnCommand API Services use ca-issued certificate with non-default password</title>
      <link>https://community.netapp.com/t5/Software-Development-Kit-SDK-and-API-Discussions/OnCommand-API-Services-use-ca-issued-certificate-with-non-default-password/m-p/137862#M2574</link>
      <description>&lt;P&gt;Hi all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;LIttle correction for step [6].&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[6] Generate new keystore "keystore.jks" and key pair&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;[6]# keytool -genkey -alias hostname -keyalg RSA -keystore keystore.jks -keysize 2048&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;keytool -genkey -alias hostname -keyalg RSA -keystore keystore.jks -keysize 2048&lt;BR /&gt;Enter keystore password:&lt;BR /&gt;Re-enter new password:&lt;BR /&gt;What is your first and last name?&lt;BR /&gt;[Unknown]: hostname.domain.com&lt;BR /&gt;What is the name of your organizational unit?&lt;BR /&gt;[Unknown]:&lt;BR /&gt;What is the name of your organization?&lt;BR /&gt;[Unknown]: COMPANY&lt;BR /&gt;What is the name of your City or Locality?&lt;BR /&gt;[Unknown]: CITY&lt;BR /&gt;What is the name of your State or Province?&lt;BR /&gt;[Unknown]:&lt;BR /&gt;What is the two-letter country for this unit?&lt;BR /&gt;[Unknown]: CX&lt;BR /&gt;Is CN=hostname.domain.com, OU=Unknown, O=COMPANY, L=CITY, ST=Unknown, C=CX correct?&lt;BR /&gt;[no]: yes&lt;/P&gt;
&lt;P&gt;Enter key password for &amp;lt;hostname&amp;gt;&lt;BR /&gt;(RETURN if same as keystore password): &lt;STRONG&gt;&amp;lt;KEY_PASSWORD&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2018 14:46:40 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Software-Development-Kit-SDK-and-API-Discussions/OnCommand-API-Services-use-ca-issued-certificate-with-non-default-password/m-p/137862#M2574</guid>
      <dc:creator>Ladislav_Hajzer</dc:creator>
      <dc:date>2018-02-06T14:46:40Z</dc:date>
    </item>
    <item>
      <title>Re: OnCommand API Services use ca-issued certificate with non-default password</title>
      <link>https://community.netapp.com/t5/Software-Development-Kit-SDK-and-API-Discussions/OnCommand-API-Services-use-ca-issued-certificate-with-non-default-password/m-p/138530#M2594</link>
      <description>&lt;P&gt;I did (almost) the same - without re-creating the keystore.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I'm listing the content of the keystore it list all properly (keytool -list -v -keystore /opt/netapp/essentials/jboss/standalone/configuration/apiservice/keystore.jks)&lt;/P&gt;
&lt;P&gt;however jboss failes to start with below error.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it really required to create new keystore from scratch ? Why can't I use the one that exists?&lt;/P&gt;
&lt;P&gt;Or what else I might be doing wrong?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BTW the mamual is very badly written when it comes to this (also some paths are wrong in manual)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;JBOSS error:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;2018-03-01 09:46:34,758 ERROR [org.jboss.msc.service.fail] (MSC service thread 1-3) MSC000001: Failed to start service jboss.server.controller.management.security_realm.SSLRealm.key-manager: org.jboss.msc.service.StartException in service jboss.server.controller.management.security_realm.SSLRealm.key-manager: Failed to start service
        at org.jboss.msc.service.ServiceControllerImpl$StartTask.run(ServiceControllerImpl.java:1904) [jboss-msc-1.2.6.Final.jar:1.2.6.Final]
        at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) [rt.jar:1.8.0_161]
        at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) [rt.jar:1.8.0_161]
        at java.lang.Thread.run(Thread.java:748) [rt.jar:1.8.0_161]
Caused by: java.lang.IllegalStateException: org.jboss.msc.service.StartException in anonymous service: WFLYDM0018: Unable to start service
        at org.jboss.as.domain.management.security.FileKeyManagerService.loadKeyStore(FileKeyManagerService.java:193)
        at org.jboss.as.domain.management.security.AbstractKeyManagerService.createKeyManagers(AbstractKeyManagerService.java:125)
        at org.jboss.as.domain.management.security.AbstractKeyManagerService.start(AbstractKeyManagerService.java:83)
        at org.jboss.msc.service.ServiceControllerImpl$StartTask.startService(ServiceControllerImpl.java:1948) [jboss-msc-1.2.6.Final.jar:1.2.6.Final]
        at org.jboss.msc.service.ServiceControllerImpl$StartTask.run(ServiceControllerImpl.java:1881) [jboss-msc-1.2.6.Final.jar:1.2.6.Final]
        ... 3 more
Caused by: org.jboss.msc.service.StartException in anonymous service: WFLYDM0018: Unable to start service
        at org.jboss.as.domain.management.security.FileKeystore.load(FileKeystore.java:153)
        at org.jboss.as.domain.management.security.FileKeyManagerService.loadKeyStore(FileKeyManagerService.java:189)
        ... 7 more
Caused by: java.io.IOException: Keystore was tampered with, or password was incorrect
        at sun.security.provider.JavaKeyStore.engineLoad(JavaKeyStore.java:780) [rt.jar:1.8.0_161]
        at sun.security.provider.JavaKeyStore$JKS.engineLoad(JavaKeyStore.java:56) [rt.jar:1.8.0_161]
        at sun.security.provider.KeyStoreDelegator.engineLoad(KeyStoreDelegator.java:224) [rt.jar:1.8.0_161]
        at sun.security.provider.JavaKeyStore$DualFormatJKS.engineLoad(JavaKeyStore.java:70) [rt.jar:1.8.0_161]
        at java.security.KeyStore.load(KeyStore.java:1445) [rt.jar:1.8.0_161]
        at org.jboss.as.domain.management.security.FileKeystore.load(FileKeystore.java:112)
        ... 8 more
Caused by: java.security.UnrecoverableKeyException: Password verification failed
        at sun.security.provider.JavaKeyStore.engineLoad(JavaKeyStore.java:778) [rt.jar:1.8.0_161]
        ... 13 more
&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Mar 2018 08:57:33 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Software-Development-Kit-SDK-and-API-Discussions/OnCommand-API-Services-use-ca-issued-certificate-with-non-default-password/m-p/138530#M2594</guid>
      <dc:creator>marcinlub</dc:creator>
      <dc:date>2018-03-01T08:57:33Z</dc:date>
    </item>
    <item>
      <title>Re: OnCommand API Services use ca-issued certificate with non-default password</title>
      <link>https://community.netapp.com/t5/Software-Development-Kit-SDK-and-API-Discussions/OnCommand-API-Services-use-ca-issued-certificate-with-non-default-password/m-p/138533#M2596</link>
      <description>&lt;P&gt;Hi.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Marcinlub&amp;gt;&amp;nbsp;I did (almost) the same - without re-creating the keystore.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;LH&amp;gt; Almost, but you added new keystore configuration to file [1] and in my opinion this is not necessarry because&amp;nbsp;this configuration is already in file [2]. Enough is to change passwords in files [2] and [3].&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Marcinlub&amp;gt;&amp;nbsp;When I'm listing the content of the keystore it list all properly&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;LH&amp;gt; Yes of course, but you still&amp;nbsp;use old Netapp password "changeit", which is password for Keystore, but also for key.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Marcinlub&amp;gt;&amp;nbsp;Is it really required to create new keystore from scratch ? Why can't I use the one that exists?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;LH&amp;gt; No, it is not required, you can use existing keystore, but if you want to change default passwords for keystore and key you must also change this (because files [2] and [3] only use those passwords).&amp;nbsp;If you want&amp;nbsp;to change the password for JAVA keystore you can do this as in [4]. If you want to change password for the specific key which is stored in keystore you can do this as in [5].&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;L.H.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[1]&amp;nbsp;/opt/netapp/essentials/jboss/standalone/configuration/standalone.xml&lt;/P&gt;
&lt;P&gt;[2]&amp;nbsp;&lt;SPAN&gt;/opt/netapp/essentials/jboss/standalone/configuration/standalone-full.xml&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;[3]&amp;nbsp;/opt/netapp/api-server/api-tools/config/keystore-config.properties&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;[4] JAVA keystore - change keystore password&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;#&amp;nbsp;cd /opt/netapp/essentials/jboss/standalone/configuration/apiservice/&lt;/P&gt;
&lt;P&gt;# keytool -storepasswd&amp;nbsp;-keystore keystore.jks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;[5] JAVA keystore - change password for specific key&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;#&amp;nbsp;cd /opt/netapp/essentials/jboss/standalone/configuration/apiservice/&lt;/P&gt;
&lt;P&gt;#&amp;nbsp;keytool -keystore keystore.jks -alias&amp;nbsp;&amp;lt;key_alias&amp;gt; -keypasswd&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NOTE: &amp;lt;key_alias&amp;gt; is alias for specific key which is stored in keystore.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Mar 2018 10:08:00 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Software-Development-Kit-SDK-and-API-Discussions/OnCommand-API-Services-use-ca-issued-certificate-with-non-default-password/m-p/138533#M2596</guid>
      <dc:creator>Ladislav_Hajzer</dc:creator>
      <dc:date>2018-03-01T10:08:00Z</dc:date>
    </item>
  </channel>
</rss>

