Keystore type: JKS Keystore provider: SUN Your keystore contains 1 entry Alias name: nifi-key Creation date: May 17, 2018 Entry type: PrivateKeyEntry Certificate chain length: 2 Certificate[1]: Owner: CN=rsdevhdf1.medassurant.local, OU=NIFI Issuer: CN=rsdevhdf3.medassurant.local, OU=NIFI Serial number: 1636e84364400000000 Valid from: Thu May 17 10:32:28 EDT 2018 until: Sun May 16 10:32:28 EDT 2021 Certificate fingerprints: MD5: 4D:12:DA:38:32:6E:7C:EF:37:95:E1:06:3D:94:91:48 SHA1: A3:34:80:93:D1:C8:17:DA:0E:1C:B1:8B:55:C3:E9:73:D4:64:C6:07 SHA256: A5:4D:C0:36:EB:46:E9:F5:6E:DD:57:10:E2:7E:23:3F:B4:97:4B:E8:A0:07:2F:8B:7D:99:CF:37:49:54:45:E7 Signature algorithm name: SHA256withRSA Subject Public Key Algorithm: 2048-bit RSA key Version: 3 Extensions: #1: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 49 28 DB A7 66 67 97 AF AF 9D 34 CC 79 C0 1F B8 I(..fg....4.y... 0010: D6 4E 37 47 .N7G ] ] #2: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] #3: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ clientAuth serverAuth ] #4: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Non_repudiation Key_Encipherment Data_Encipherment Key_Agreement ] #5: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ DNSName: rsdevhdf1.medassurant.local ] #6: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: DB C1 9D 43 A1 7F 9D 45 B0 85 AA B2 CC 41 24 E8 ...C...E.....A$. 0010: 83 8A 9D 04 .... ] ] Certificate[2]: Owner: CN=rsdevhdf3.medassurant.local, OU=NIFI Issuer: CN=rsdevhdf3.medassurant.local, OU=NIFI Serial number: 162c0b11dfb00000000 Valid from: Fri Apr 13 16:27:35 EDT 2018 until: Mon Apr 12 16:27:35 EDT 2021 Certificate fingerprints: MD5: 0B:E6:9B:74:F3:44:97:93:C6:B6:F7:C2:8D:C4:43:14 SHA1: E0:3F:B4:96:9A:4C:2B:94:AF:85:0D:DA:70:B5:40:B0:AD:B3:9D:4A SHA256: D1:B0:3B:CE:F1:2F:DA:C0:53:49:B9:21:A4:A2:A0:B8:7D:75:78:A1:8C:9E:3A:2B:D0:92:7B:05:66:FE:9E:EF Signature algorithm name: SHA256withRSA Subject Public Key Algorithm: 2048-bit RSA key Version: 3 Extensions: #1: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 49 28 DB A7 66 67 97 AF AF 9D 34 CC 79 C0 1F B8 I(..fg....4.y... 0010: D6 4E 37 47 .N7G ] ] #2: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ clientAuth serverAuth ] #4: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Non_repudiation Key_Encipherment Data_Encipherment Key_Agreement Key_CertSign Crl_Sign ] #5: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 49 28 DB A7 66 67 97 AF AF 9D 34 CC 79 C0 1F B8 I(..fg....4.y... 0010: D6 4E 37 47 .N7G ] ] ******************************************* ******************************************* Warning: The JKS keystore uses a proprietary format. It is recommended to migrate to PKCS12 which is an industry standard format using "keytool -importkeystore -srckeystore keystore.jks -destkeystore keystore.jks -deststoretype pkcs12". [root@rsdevhdf1 0]#