Build cgms_keystore File
Here are the instructions on how to build cgms_keystore file from the scratch that contains the required certificates and keys.
Procedure
|
Step 1 |
Change directory to /opt/fnd/data on linux host. Example:
|
||
|
Step 2 |
To create the keystore file with the keytool command, ensure it is named cgms_keystore, as Cisco IoT FND requires this specific name. First, copy your organization issuing CA certificate to a location on the server, such as /root/rootca.pem, using a file transfer method like SCP. The certificate can be in .cer, .crt, or .pem format. In this example, since the issuing CA is the root CA, use the alias name "root." Example:
Convert the keystore from jks to pkcs12
Verify that the file has been created by listing the contents of the keystore.
|
||
|
Step 3 |
Import a Cisco IoT FND certificate into your system. Use the following command to create a key pair and a Certificate Signing Request (CSR). The key pair is like a lock and key for your system, and the CSR is a request to get a digital certificate that matches this key. Example:
|
||
|
Step 4 |
Use the following command to create the CSR file required by the CA to issue your certificate. Example:
|
||
|
Step 5 |
Send this CSR file to the CA. They will give you back a certificate for your server. |
||
|
Step 6 |
Once you receive the certificate, for example, as a file named |
||
|
Step 7 |
Use the following command to import the certificates: Example:
|
||
|
Step 8 |
If your Cisco IoT FND certificate is in a .pfx format, you need to know the alias name used in your .pfx file before importing it. Use the following command to find the alias name: Example:
|
||
|
Step 9 |
Once you have the alias name from the .pfx file, you need to import it into your keystore using the alias cgms. Example:
|
You've built the cgms_keystore file.
What to do next
Import SUDI with 2029 and 2000 expiries.

Feedback