Interface Certificate Configuration
Interface Certificate Configuration
Interface Certificate Configuration
Note to save the certificates in "Base-64 encoded X.509(.CER)" and with extn.cer, steps for
saving certificates from the vendor website.
Once all certificates are saved, add all the certificates or certificate chain in default.txt files.
Paste the Experian, Equifax and CSC certificates or certificate chain in default.txt file as indicated
below.
1.3.2 MDB flow
Commands
• Create the key store
keytool -genkey -keyalg RSA -keystore keystore <Key store Path> / file_name.jks -
keysize 2048
• Import the certificates
keytool -import -trustcacerts -file <file_path>/file_name.cer -alias alias_name -keystore
keystore <Key store Path> / file_name.jks
Note: for <file_path>/file_name.cer please find above section Download the certificates.
• View the certificates
keytool -list -v -alias alias <alias as mentioned in config file> -keystore <Key store Path> /
file_name.jks
So after getting the certificates using below command can create the JKS file.
Note: transunion JKS(KeyStore) file is common for non-mdb and mdb flow.
If the certificate doesn’t have public key associated with it, then it can be directly imported in
WebLogic KeyStore as detailed below.
4. Select certificate type as Trusted Certificate and give the alias name same as channel name.
5. Upload the certificate. (To get the certificate, refer Download the certificate section).
6. Certificate imported successfully in WebLogic KeyStore.
• If the certificate has public key associated with it, then it can’t be directly imported in
WebLogic KeyStore, instead below steps has to be followed to import it into WebLogic
KeyStore.
To do so, connect to the AdminServer and then execute the following commands:
Commands:
$ cd $MW_HOME/oracle_common/common/bin/
$ ./wlst.sh
wls:/offline> connect()
Please enter your username :USER_NAME
Please enter your password : XXXXXXXX
Please enter your server URL t3://<host name>:<port>
wls:/demo_domain/serverConfig/> svc = getOpssService(name='KeyStoreService')
wls:/mydomain/serverConfig> svc.importKeyStore(appStripe='OFSLL_STRIPE',
name='OFSLL_KSS', password='XXXXX',aliases=alias_ name',
keypasswords=',xxxxxxxx, type='JKS', permission=true,
filepath='$file_path/file_name.jks')
Note: to get the JKS file please refer to section 1.2 Download certificate and KeyStore creation
section.
Below screen indicates WebLogic KeyStore after importing the certificate.