IBM iKeyman
1. Go to JDK installed dir, then go to jre\lib\security dir.
2. In Security dir, open the java.security file and add provider in list of providers section.
3. The property name and value are security.provider.1=com.rsa.jsafe.provider.JsafeJCE.
4. Need to modify the list numbers to give the order.
5. Copy the crypto.jar from jsafe 4.x in jre\lib folder or update the classpath from where your running the sample.
In case of only jre is installed. Go to the jre installed dir and repeat the steps from 2-5 to run the sample or client.
Workaround:
Get KeyTool UI from http://yellowcat1.free.fr/index_ktl.html
Click on Tools --> Keystore Manager ? PKCS12 keystore...
Select your P12 & provide its password.
Right click on the "key" row --> Rename private key alias
Name it "key_and_cert"
Right click on the "cert" row --> Rename Trusted Certifcate alias
Name it "ca_cert"
Close KeyTool UI
Related Articles
Downloading the Client Keystore for the AFX Server results in an HTTP 404 error in RSA Identity Governance & Lifecycle 127Number of Views How to Update the Root (Server) and Client Certificates in RSA Identity Governance & Lifecycle 2.18KNumber of Views Error 'Invalid X.509 certificate uploaded' when adding a new application 59Number of Views Error "keytool error: java.lang.Exception: Failed to establish chain from reply" when importing the SSP CA signed certific… 1.23KNumber of Views Request Could not be Handled while generating server.keystore & client.keystore in RSA Governance & Lifecycle 231Number of Views
Trending Articles
RSA Authentication Manager 8.9 Release Notes (January 2026) Connection fails to Cloud Authentication Service when connecting through a proxy server from RSA Authentication Manager to… RSA Release Notes: Cloud Access Service and RSA Authenticators Update an existing RSA Cloud Authentication Service Integrated Windows Authentication (IWA) Connector Identity Provider SA… Quick Setup Guide - Connect Authentication Manager to Cloud Access Service with an Embedded Identity Router