Installing EJBCA as a CA with a Management CA
Congratulations, dear traveler. If you've made it to this point it probably means you're in your first steps of setting up your PKI, and if that's the case we would like to thank you for making it this far, and would like to ask you to hold on to your hat for the rest of the trip!
Running the Install Command
Running the installation command will do three things:
It will create the Management CA. This is an administrative CA which will be both used for internal administration of your PKI by signing user certificates, and be used for signing the following points
Create TLS keystores for handling HTTPS, signed by the Management CA
Create the key store for the initial super administrator
It will also add some initial access control values to the database, and role information for the super administrator user
If you are moving an existing installation that already has TLS keystores available, this step is not needed.
$ ant runinstall
Deploy TLS Keystores to WildFly
After the install, TLS keystores have been created. Run this command to copy them to wildfly_home/standalone/configuration/keystore:
$ ant deploy-keystore
Adding in Other Management CAs to the Key Store
For more information, see Roles and Access Rules Operations.
If you create other CAs that you want to add as acceptable CAs in the server TLS configuration, or if you renew the CA certificate, you can install any CA certificate in the server TLS configuration afterwards with the following command:
$ ant -Dca.name=
"My CA Name"
javatruststore
What this does in the background is that it adds the CA certificate to p12/truststore.jks and copies this file to APPSRV_HOME/standalone/configuration/keystore, where the TLS keystores are located. This step will require a restart of the application server.
Next Step: Finalizing the Installation
Continue by reviewing information on Finalizing the installation.