CERTivity® KeyStores Manager

CERTivity® main features and advantages are briefly presented below and in more detail in its manual available for download.

  • GUI Representation

    The first purpose of CERTivity targets the representation of the security related items in a Tabbed Document Interface allowing for visualizing in parallel the following types of models: KeyStores, individual Certificates and Test Certificate Scenarios. The GUI representation is taking advantage of the natural approach of using an IDE style interface.

    KeyStore’s entries are represented using a Tree Table structure, each entry and subentry being visualized in a Details Panel resembling the view of an e-mail client. As well, KeyStore’s entries take advantage of contextual menus or natural editing actions such as but not limited to delete, rename, expand, undo/redo. Many of these actions can also be used through Keyboard shortcuts. Navigation between KeyStore entries is enhanced by positioning based on the first character (case sensitive) of a KeyStore alias or by sorting the table columns.

    Many of the application’s components expose Context Sensitive Help, the Table of Contents tree being synchronized with the current context. Status Bar is displaying useful information including if the KeyStore is case sensitive, or case aware. Quick Search feature at application, KeyStore and Options level allows for rapid localization of information and actions.

    As the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files are sensitive to country import restrictions CERTivity is not allowed to bundle them, however for the entitled users CERTivity features a straight forward installation from the Oracle JDK website via an integrated JavaFX browser.

    All the Java command line keytool actions and more other actions are available as described below through this rich and productive GUI.

  • KeyStore Management

    The application is able to work with a wide range of KeyStores types – JKS, JCEKS, PKCS #12, BKS, BKS-V1, UBER and Windows native ones. These cover the KeyStores required by the Android/Java tools for signing the Android applications (APK) for release and test validating the APK signature. CERTivity can as well help on managing X.509 DER certificates (.crt,.cer) and PKCS# 12 (.pfx) or BKS KeyStores to be used on the Android devices for applications requiring security levels such as SSL and VPN.

    The following KeyStore operations, which cover (but are not limited to) the handling of Java SSL KeyStores and TrustStores, are supported:

    1. Create (generate) a new KeyStore;
    2. Open an existent KeyStore;
    3. Opening the CA TrustStore(s) of the JRE(s) discovered on the current system;
    4. Save a KeyStore;
    5. Copy and paste entries from one KeyStore to another;
    6. Copy to clipboard Certificates from Key Pair’s Certificates Chain;
    7. Change a KeyStore’s password;
    8. Change a Key Pair’s password;
    9. Password manager to avoid entering Key passwords each time;
    10. Emphasizing expired and about to expire Certificates or Key Pairs;
    11. Emphasizing Certificates and Key Pairs for which the key size is smaller than a value set by the user;
    12. Display trust status for Certificates in the KeyStore view;
    13. Convert to other KeyStore format;
    14. Delete KeyStore entry;
    15. Change KeyStore entry alias;
    16. Import Key Pairs from Key Pair files or from separate Private Key and one or more certificate files;
    17. Import trusted Certificates;
    18. Trust verification when importing certificates (with user confirmation when trust is not established);
    19. Add Certificate Extensions;
    20. Save Certificate Extensions as XML;
    21. Generate self signed Key Pairs (Private Key with corresponding Certificate) using RSA/DSA/EC/ECGOST3410;
    22. 80 parameters specifications for Elliptic Curve – EC (DSA), 5 parameters specifications for ECGOST3410;
    23. Generate new Key Pairs using the information from other already existing Key Pairs;
    24. Set a custom minimum key size limit for new RSA Key Pair generation;
    25. Select the country code from a list of available countries resulting a valid ISO country code when generating a Key Pair;
    26. Generate Secret Keys;
    27. Retrieve certificates from servers (e-mail server, web server etc.) – This is based on the underlying SSL/TLS protocols;
    28. Set SSL Connection Type (to be used when retrieving certificates);
    29. View RSA/DSA/EC/ECGOST3410 Private Key, Public Key, Certificate Chain details;
    30. Configurable KeyStore persistence on successive runs of the application.
  • Certificates Operations
    1. Import Certificates/Certificates Chains into KeyStore either from files or from SSL connections;
    2. Open an existing Certificate as standalone (not part of a KeyStore);
    3. Display Certificate Details (having 11 Certificate Fingerprints types available);
    4. Display certificate trust status;
    5. Display multiple certificates including certificates chains;
    6. Obtain the revocation status from the signing CA through CRL;
    7. Use / test a certificate against a SSL connection (including plain upgradeable sockets) to an end-point and permitting raw TCP/IP level communication (similar to telnet/nc raw inspections); verbose handshaking information is also available;
    8. View Public Key details for the opened certificate;
    9. View PEM, ASN.1 representations;
    10. View Certificate Extensions;
    11. View ASN.1 representation for a Certificate Extension;
    12. Extend validity for a Key Pair entry.
  • Sign and Verify

    CERTivity aims to bridge the gap between keys management and digital signature functionality as well as offering a suitable introspection for developers interested in various investigations. CERTivity signs and verifies PDF, JAR and XML files with verbose details. CSR can be signed as well.

    1. Existent signature applications lack the in-depth key management and viceversa, existent key management applications lacks the signing and verification process or the verbose details. CERTivity interconnects these functionalities;
    2. The embedded signature certificate can be directly imported into the active KeyStore;
    3. Signing is a contextual action while you browse the KeyStores so you will take advantage of all the existent key management features described above;
    4. PDF digital signature and verification:
      1. Many existent PDF signature applications cover just the signature process, leaving the verification process to PDF readers or editors. CERTivity is offering a PDF signature verification process too, which can show you details that are not otherwise accessible, especially when you deal with the PDF specification;
      2. Each signature details can be inspected;
      3. All PDF standard SubFilter values are supported: adbe.pkcs7.sha1, adbe.pkcs7.detached and adbe.x509.rsa_sha1 as opposed to the general practice of supporting just adbe.pkcs7.detached;
      4. The name of the PDF signature handler (Filter) is Adobe.PPKLite;
      5. Multiple PDF signatures can be applied incrementally;
    5. XML digital signature and verification:
      1. All XML signature types are supported: enveloped, enveloping and detached;
      2. The XML signature is based on Java Specification Request JSR-105 which standardizes the XML Digital Signature APIs;
    6. JAR digital signature and verification:
      1. GUI alternative of the Java command line jarsigner tool, both for signing and verifying;
      2. Sign and verify the Android Application Package (APK) signature.
  • Import/Export Options
    1. Retrieve and Export Certificates from multiple sources into multiple formats;
    2. Export Key Pairs, Certificates Chains, Private Keys, Public Keys;
    3. Some of the formats supported besides the KeyStores themselves are:
      1. X.509 Certificate Files;
      2. X.509 Certificate Files (PEM encrypted);
      3. PKCS #7 Certificate Files;
      4. PKCS #7 Certificate Files (PEM encrypted);
      5. PKI Path Certificate Files;
      6. PKCS #12 Key Pairs;
      7. PKCS #8 Key Pairs;
      8. OpenSSL Public Key;
      9. OpenSSL Public Key (PEM encrypted);
      10. PKCS #8 Private Key Files;
      11. PKCS #8 Private Key Files (PEM encoded);
      12. OpenSSL Private Key Files (PEM encoded);
      13. PKCS #10 for CSR;
      14. SPKAC for CSR;
      15. ASN and PEM for visualizing most of the items.
  • TrustStores Management
    1. Set / Remove TrustStores at runtime without restarting the application;
    2. Configure Trust Path validation options at runtime without restarting the application.
  • Certificate Authority functions
    1. Certificate Signing made easier using “Select as CA Issuer” and “Sign Certificate by <aliasForIssuer>” actions;
    2. Generate Certificate Signing Request (CSR) files;
    3. Sign Certificate Signing Request (CSR) files;
    4. Import CA Reply;
    5. Trust verification when Importing CA Reply (with user confirmation when trust is not established);
    6. Check PKI file type;
    7. Open Certificate Revocation Lists (CRL) from files or URLs;
    8. Open Certificate Signing Request (CSR) files;
    9. Certificate chain management: append and remove signer certificate (with Copy / Paste / Delete / Undo / Redo functionality included);
    10. By generating CSR files, signing CSR and importing CA reply the application can act as a testing purposes CA.
  • Multi-platform

    Being a Java application it runs anywhere an Oracle (Sun) JRE can run. Depending on the platforms, CERTivity comes bundled with JRE or standalone. Please check the download page for the suitable setup package.

Most of the operations are executed on separate threads, so that, for example, while generating a key or signing a PDF file one can perform other tasks as well.

You can download and use CERTivity for free.