Keycloak and Using a SMTP Server with Custom CA

Keycloak and Using a SMTP Server with Custom CA

In an environment where your Simple Mail Transfer Protocol (SMTP) server uses a custom Certificate Authority (CA), configure Keycloak to trust the certificate on the SMTP server.
You must do this after installing Resonate RFID Reader Management and before you can access it. If Keycloak is not configured to trust the certificate, you will not receive the email at the specified administrator address with the link to the newly installed Resonate RFID Reader Management platform, requesting you to set the administrator’s password.
To trust the certificate, add it to the Keycloak truststore, by default, located at
/etc/ssl/certs/java/cacerts
. This is the standard location for the OS Java truststore on Ubuntu. If this truststore already contains your custom CA's certificate, Keycloak already trusts your certificate. Otherwise, add the certificate to this truststore using a tool like Keytool. Keytool requires that you set a password. Remember this password for later; you need to specify it when you add the certificate to the Keycloak truststore.
If you change the location of the Keycloak truststore, make sure it is accessible to
trif-user
on the cluster.
/tmp
will most likely work.