diff --git a/docs/security.html b/docs/security.html index 09a6c332e43..5e2b202f13f 100644 --- a/docs/security.html +++ b/docs/security.html @@ -43,7 +43,7 @@ The first step of deploying HTTPS is to generate the key and the certificate for each machine in the cluster. You can use Java's keytool utility to accomplish this task. We will generate the key into a temporary keystore initially so that we can export and sign it later with CA.
-            keytool -keystore server.keystore.jks -alias localhost -validity {validity} -genkey
+ keytool -keystore server.keystore.jks -alias localhost -validity {validity} -genkey -keyalg RSA You need to specify two parameters in the above command:
    @@ -63,7 +63,7 @@
    Both fields are valid, RFC-2818 recommends the use of SAN however. SAN is also more flexible, allowing for multiple DNS entries to be declared. Another advantage is that the CN can be set to a more meaningful value for authorization purposes. To add a SAN field append the following argument -ext SAN=DNS:{FQDN} to the keytool command:
    -        keytool -keystore server.keystore.jks -alias localhost -validity {validity} -genkey -ext SAN=DNS:{FQDN}
    +        keytool -keystore server.keystore.jks -alias localhost -validity {validity} -genkey -keyalg RSA -ext SAN=DNS:{FQDN}
             
    The following command can be run afterwards to verify the contents of the generated certificate: