

Find out what our Pro version of SoapUI can do to improve your testing. Now when sending the request, the outgoing message will get a signed Timestamp header – as can be seen in the Raw request tab:.Now go to the request and select this Outgoing WS configuration in the Auth tab below the request editor:.

Also make sure you select the alias of the amazon certificate in you keystore file in the Alias drop-down. You need to specify the Timestamp element explicitly in the bottom right table of parts to sign – otherwise SoapUI will sign the message body instead.

In the request above this is saved in a project level property (highlighted bottom left) and used in the request via property expansion (highlighted top right). An Access Key that can be obtained via an account at the AWS site ( ).Security for the the Amazon requests is twofold: It makes a search for “soapui” in all indexes and validates that the response contains the ASIN number of existing book on SoapUI. The ItemSearch Request in the TestCase is straightforward: The sample projects TestCase only contains one TestStep since Amazon is somewhat restrictive in allowing their APIs being used for demonstration purposes. Check Trust this certificate for identifying websites then click OK to finish the process.The Amazon API sample project uses SOAP instead of REST – which makes it somewhat easier to understand inside SoapUI since the WSDL (available at ) defines all operations and request/response messages for you.Click Browse… and select rootCA.pem then click Next.Click Next to get to the File to Import screen. This opens the Certificate Import Wizard. Click the Authorities tab, then click the Import… button.Open Chrome settings, select Security > Manage Certificates.To gain Chrome’s trust, follow the instruction: Note that with self-signed certificates your browser will warn you that the certificate is not “trusted” because it hasn’t been signed by a certification authority that is in the trust list of your browser. To verify that the certificate is built correctly: openssl verify -CAfile rootCA.pem -verify_hostname tls.crt Step 4: Adding CA as trusted to Chrome This will generate a public certificate (tls.crt) signed by our own CA that we can use on the web server later. To sign the CSR using openssl.cnf: openssl x509 -req \ -in tls.csr \ -CA rootCA.pem \ -CAkey rootCA.key \ -CAcreateserial \ -out tls.crt \ -days 730 \ -sha256 \ -extfile openssl.cnf # Extensions to add to a certificate request basicConstraints = CA:FALSE authorityKeyIdentifier = keyid:always, issuer:always keyUsage = nonRepudiation, digitalSignature, keyEncipherment, dataEncipherment subjectAltName = DNS.1 = *.kyma.local Step 3: Signing the certificate request using CA Edit the domain(s) listed under the section, be sure they match the domain name you want to use. Use the private key to create a certificate signing request: openssl req -new -key tls.key -out tls.csrĬreate a config file openssl.cnf with a list of domain names associated with the certificate. Next, we need to generate a certificate signing request (CSR).įirst, create a private key to be used during the certificate signing process: openssl genrsa -out tls.key 2048 Tip: Alternatively you can use KeyStore Explorer to verify the certificate generated. To check just created root certificate: openssl x509 -in rootCA.pem -text -noout Generate a root certificate valid for two years: openssl req -x509 -new -nodes -key rootCA.key -sha256 -days 730 -out rootCA.pem Generate an RSA private key of size 2048: openssl genrsa -des3 -out rootCA.key 2048 To become your own CA involves creating a private key (.key) and a Root Certificate Authority certificate (.pem). If you own CA, you are authorized to sign certificate requests for yourself.
