Run the keytool utility with the
-list option, as shown in the example below. keytool will display the certificates present in the truststore. Inspect the output to verify that:
- all of your certificates are listed
- all of your certificates are marked as trustedCertEntry entries
ExampleLet us say that you imported 3 certificates using aliases myfirstcert, mysecondcert and mythirdcert.
"C:\Program Files\Cisco Systems\CIS 7.0\jre\bin\keytool" -list -keystore "C:\Program Files\Cisco Systems\CIS 7.0\conf\server\security\cis_datasource_truststore_strong.jks" -storepass changeitThe output of keytool would contain 3 entries that look like this:
myfirstcert, Mar 27, 2018, trustedCertEntry,
Certificate fingerprint (SHA1): 05:63:B8:63:0D:62:D7:5A:BB:C8:AB:1E:4B:DF:B5:A8:99:B2:4D:43
mysecondcert, Mar 27, 2018, trustedCertEntry,
Certificate fingerprint (SHA1): 8C:F4:27:FD:79:0C:3A:D1:66:06:8D:E8:1E:57:EF:BB:93:22:72:D4
mythirdcert, Mar 27, 2018, trustedCertEntry,
Certificate fingerprint (SHA1): E5:DF:74:3C:B6:01:C4:9B:98:43:DC:AB:8C:E8:6A:81:10:9F:E4:8E