At some point in their career, developers come accross the need to work with security certificates. This article describes how to setup Let’s Encrypt, retrieve a certificate, renew it automatically and use the certificate in a Java application for TLS communication.

Table of contents

  1. Certificate Authorities and Let’s Encrypt
  2. Installing a Let’s Encrypt certificate
  3. Certificate renewal
  4. Automating the renewal process
  5. Using the certificates in a Java application
  6. Resources

Certificate Authorities and Let’s Encrypt

When you want to enable HTTPS on your website or need certificates for TLS communication, you’ll need to request this certificate from a Certificate Authority (CA). It acts as a trusted third party between two parties that need to communicate with each other. Let’s Encrypt is such a Certificate Authority. It is their mission to give everyone a secure and privacy-respecting web experience. That’s why they issue certificates free of charge.

Installing a Let’s Encrypt certificate

Assuming that you have shell access to your server, Let’s Encrypt recommends to use Certbot ACME Client, since it can automate certificate issuance and installation with zero downtime.

Certbot is a free, open source software tool for automatically using Let’s Encrypt certificates on manually-administrated websites to enable HTTPS.

Clear installation instructions can be found on the Certbot website. Select your web server software (Apache, Nginx, …) and operating system and Certbot provides the installation instructions.

You can check your operating system on Linux by executing cat /etc/os-release.

Please note that these instructions also include setting up HTTPS for your website, which for this tutorial isn’t necessary. We’ll use the certificate in another way, for TLS communication in a Java application.

For Ubuntu, the following steps are required to install Certbot. See also Apache on Ubuntu 16.04 (xenial).

Certbot is installed using APT (Advanced Package Tool), a tool for installing and removing applications on Debian based systems. This tool searches in its repositories for software distributions. Before you can install Certbot, you’ll need to add the Certbot PPA (Personal Package Archive) to your list of available APT repositories.

sudo apt-get update
sudo apt-get install software-properties-common
sudo add-apt-repository universe
sudo add-apt-repository ppa:certbot/certbot
sudo apt-get update

Run the following command to install Certbot.

sudo apt-get install certbot python-certbot-apache

By default, certbot retrieves a certificate and installs it immediately on your web server by adding an extra parameter, eg. --apache for Apache HTTP Server. For our situation, it is enough to retrieve a certificate. This is done by adding the certonly parameter to the command as follows:

certbot certonly

You can find the installed Let’s Encrypt certificates in the /etc/letsencrypt/live folder on your file system.

Certificate renewal

Let’s Encrypt CA issues short-lived certificates of 90 days. Therefore certificates must be renewed at least once in 3 months.

Certificate renewal is actually quite simple with Certbot. You can renew the certificates with the following command:

certbot renew

Add --dry-run to the command if you want to try it out without consequences.

Executing this command multiple times is not a problem. When the certificate is not due for renewal, nothing will happen and you’ll receive an output comparable to this:

Saving debug log to /var/log/letsencrypt/letsencrypt.log

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Processing /etc/letsencrypt/renewal/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Cert not yet due for renewal
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

The following certs are not due for renewal yet:
  /etc/letsencrypt/live/ expires on 2019-09-14 (skipped)
No renewals were attempted.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Automating the renewal process

Certbot automatically renews certificates on most operating systems now.

Check your operating system’s crontab (typically in /etc/crontab/ and /etc/cron.*/* and systemd timers (systemctl list-timers). On our Ubuntu system we executed systemctl list-timers and found a certbot.timer.

NEXT                          LEFT          LAST                          PASSED       UNIT                         ACTIVATES
Wed 2019-08-14 10:47:41 CEST  1h 19min left Tue 2019-08-13 18:00:03 CEST  15h ago      certbot.timer                certbot.service

It basically boils down to the certbot renew command being executed periodically.

If your Linux distribution package didn’t install the cronjob, you can easily set this up yourself. Since we need to automate the keystore and truststore creation as well, you can look at the section Automate the keystore and truststore creation process for more information on creating cronjobs.

Using the certificates in a Java application

All generated keys and issued Let’s Encrypt certificates can be found in the /etc/letsencrypt/live folder on your file system. We will now see how we can import them in Java keystore files to use them in a Java application.

Importing certificates into cacerts

The first way you can use certificates in a JVM is to add them to the cacerts file of your Java distribution.

Every JRE has its own keystore, which contains all Certificate Authorities it trusts. This is also referred to as a truststore. This truststore is stored as a file called cacerts. It is typically located in $JAVA_HOME/jre/lib/security assuming $JAVA_HOME is where your JRE or JDK is installed. The default password for this keystore is changeit.

The following command imports the certificates into your JRE truststore.

keytool -import -alias \
	-keystore $JAVA_HOME/jre/lib/security/cacerts \
	-file /etc/letsencrypt/live/ \
	-storepass changeit \

Please note that adding certificates to cacerts is not always the best solution. Although technically it is a fully functional keystore file, its purpose is mainly for determining which third-party certificates to trust. On top of this, it is tied to your Java installation and when you install another JRE or JDK, you’ll need to add the certificates again.

Our preferred approach is to add your own certificates to a keystore and the third-party certificates to a separate truststore. Continue reading to see how you can do that.

Creating a separate .keystore file

To use a certificate in a Java application, the preferred way is to add it to a separate .keystore file.

The Java Runtime Environment (JRE) ships with a tool called keytool to create certificates and manipulate key stores. Adding certificates to a keystore can be done by using OpenSSL and the keytool.

You cannot import multiple public and private .pem certificates directly in a keystore, so you’ll first need to add all .pem files to a PKCS 12 archive. We do this with the OpenSSL tool with the following command.

openssl pkcs12 -export \
	 -in /etc/letsencrypt/live/ \
	 -inkey /etc/letsencrypt/live/ \
	 -out /tmp/ \
	 -name \
	 -CAfile /etc/letsencrypt/live/ \
	 -caname "Let's Encrypt Authority X3" \
	 -password pass:changeit

Change with your own DNS name.

The next step is to import the certificates into a .keystore file.

keytool -importkeystore \
	-deststorepass changeit \
	-destkeypass changeit \
	-deststoretype pkcs12 \
	-srckeystore /tmp/ \
	-srcstoretype PKCS12 \
	-srcstorepass changeit \
	-destkeystore /tmp/ \

You can now load the keystore at location /tmp/ in your Java application.

Please note that you not only need to create a keystore with your own certificates, but also a truststore with the trusted third-party certificates. However, the approach is exactly the same.

Automate the keystore and truststore creation process

Create a shell script /home/<username>/ with the following content:


# Create keystore
echo "Refreshing '~/ssl/'"
openssl pkcs12 -export \
	 -in /etc/letsencrypt/live/ \
	 -inkey /etc/letsencrypt/live/ \
	 -out /tmp/ \
	 -name \
	 -CAfile /etc/letsencrypt/live/ \
	 -caname "Let's Encrypt Authority X3" \
	 -password pass:changeit
keytool -importkeystore \
	-deststorepass changeit \
	-destkeypass changeit \
	-deststoretype pkcs12 \
	-srckeystore /tmp/ \
	-srcstoretype PKCS12 \
	-srcstorepass changeit \
	-destkeystore /tmp/ \
# Move certificates to other servers
echo "Copy '~/ssl/' to cluster servers"
cp /tmp/ /home/admin_jworks/ssl/
scp  /tmp/ cc-backend-node-02:/home/admin_jworks/ssl/
scp  /tmp/ cc-frontend-node-01:/home/admin_jworks/ssl/

# Create truststore
echo "Refreshing '~/ssl/'"
openssl s_client -connect -showcerts </dev/null 2>/dev/null|openssl x509 -outform DER >theirdomain.der
openssl x509 -inform der -in theirdomain.der -out theirdomain.pem
keytool -import \
	-alias theirdomain \
	-keystore \
	-file ./theirdomain.pem \
	-storepass theirdomain \
echo "Copy '~/ssl/' to cluster servers"
cp /home/admin_jworks/ssl/
sudo scp ssl/ cc-backend-node-02:/home/admin_jworks/ssl/
sudo scp ssl/ cc-frontend-node-01:/home/admin_jworks/ssl/

You might not need everything from this script. It does more than creating a new keystore:

  • It creates the keystore as described in the previous section Creating and using a separate .keystore file
  • It creates a truststore by connecting to the third-party server, writing their certificate to a file called theirdomain.pem and importing that file in
  • It also copies both keystore and truststore files to other servers in our cluster

The command to execute this shell script is installed in one of the following locations: /etc/crontab/, /etc/cron.*/* or systemctl list-timers. eg. To execute the script once every hour, you can add it to /etc/cron.hourly.

We will edit the contents of the crontab file on the system with crontab -e. The line should start with a cron expression telling the system when to execute the task followed by the command to be executed.

Example of job definition:
.---------------- minute (0 - 59)
| .------------- hour (0 - 23)
| | .---------- day of month (1 - 31)
| | | .------- month (1 - 12) OR jan,feb,mar,apr ...
| | | | .---- day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat
| | | | |
* * * * * command to be executed

You can read more on cron expressions in the Baeldung blog A Guide To Cron Expressions.

The following line in crontab makes sure our script is executed every hour.

0 * * * * bash /home/<username>/ >> /var/log/renew-keystore.log 

Remember to set execute permissions on the created script to allow the system to run the script.

chmod +x /home/<username>/

There’s no need to restart something after changing the crontab file. Cron will examine the modification time on all crontabs and reload those which contain changes.

Using keystores and truststores in a Java application

Spring Boot configuration properties

We’ll be using Spring Boot to externalize our TLS configuration. First, we add properties to point to our keystore and truststore archives on the filesystem and provide the necessary passwords.

Please note that there are existing Spring Boot properties prefixed with server.ssl to configure TLS. However, these properties are used for securing connections to your Tomcat server. They will not configure HTTP clients used within your application. We also need to configure more information about the service we’re consuming, eg. the endpoint url. We therefore specify our own properties.

        trust-store: /ssl/
        trust-store-password: changeit
        key-store: /ssl/
        key-store-password: changeit

Then we load those properties in a @ConfigurationProperties object.

public class MyClientProperties {
    private String remoteServiceEndpointUrl;
    private String keyStore;
    private String keyStorePassword;
    private String trustStore;
    private String trustStorePassword;
    // Getters and setters

This class is instantiated by Spring and can be autowired in other beans.

Java’s SSLContext and HTTP clients

In Java there are several frameworks you can use to establish an HTTP connection.

  • Java’s built-in HttpURLConnection
  • Apache HttpComponents HttpClient – Please note that this is the successor of Commons HttpClient. If you’ll be using this client, make sure you’re importing the org.apache.httpcomponents version.
  • OkHttp

Java supports TLS communication through its class.

We’ll be using Apache’s HttpClient to setup TLS communication. This library has builder classes with which you can easily create an SSLContext.

Add the following Maven dependencies.


Now you can use the org.apache.http.ssl.SSLContexts and org.apache.http.ssl.SSLContextBuilder to create an

SSLContext sslContext = SSLContexts
    .loadKeyMaterial(Paths.get(properties.getKeyStore()).toFile(), properties.getKeyStorePassword().toCharArray(), properties.getKeyStorePassword().toCharArray())
    .loadTrustMaterial(Paths.get(properties.getTrustStore()).toFile(), properties.getTrustStorePassword().toCharArray())

This SSLContext can be used to create an Apache org.apache.http.impl.client.CloseableHttpClient. We create the CloseableHttpClient with the org.apache.http.impl.client.HttpClients utility class.

final CloseableHttpClient client = HttpClients

If you don’t have the .setSSLContext(sslContext), please check your org.apache.httpcomponents:httpclient version.

Each HTTP request executed using this client will be sent over a TLS connection.

Please note that you also have the possibility to set the following Java system properties and ensure all communication uses TLS.

System.setProperty("", "true");
System.setProperty("", properties.getTrustStore());
System.setProperty("", properties.getTrustStorePassword());
System.setProperty("", properties.getKeyStorePassword());
System.setProperty("", properties.getKeyStore());
System.setProperty("", properties.getKeyStorePassword());
System.setProperty("", "need");

Although it’s a valid possibility, these are settings for the entire system. On top of that, when you need to integrate with multiple third-parties and are dealing with multiple trusted parties and multiple public/private keypairs, it can become a mess to add everything to single keystore and truststore files.

Using the keystore with Spring REST

In the previous section we learned how to create an and an Apache HttpComponents CloseableHttpClient.

Calling REST endpoints with Spring REST is done by using the org.springframework.web.client.RestTemplate class. This class is part of the spring-web module, which is automatically added by adding the spring-boot-starter-web dependency.


Spring’s RestTemplate is an abstraction of the different HTTP clients we can use in Java. Under the hood, when a request is executed on the RestTemplate, Spring uses the passed org.springframework.web.client.ClientHttpRequestFactory to create a org.springframework.http.client.ClientHttpRequest, executes the request and transforms it to a org.springframework.http.client.ClientHttpResponse. There’s a specific implementation of these classes for each HTTP client.

For example, for Apache’s HttpComponents HttpClient, you can find classes with the prefix HttpComponents:

  • org.springframework.http.client.HttpComponentsClientHttpRequestFactory
  • org.springframework.http.client.HttpComponentsClientHttpRequest
  • org.springframework.http.client.HttpComponentsClientHttpResponse

We’ll use HttpComponentsClientHttpRequestFactory to customize the RestTemplate and we register it with the Spring context by annotating the method with @Bean in one of the configuration classes.

public RestTemplate restTemplate() throws Exception {
    return new RestTemplate(new HttpComponentsClientHttpRequestFactory(client));

Please note that in the above code snippet, client must be an instance of Apache’s HttpComponents HttpClient, eg. the CloseableHttpClient we created in the previous section.

Using the keystore with Spring WS

From time to time you have to integrate with a SOAP web service from the customer or a third party and use TLS communication when doing so.

In the following example, we’ll use Spring Web Services to implement this. Spring WS defines an interface of which you can create an instance. It uses an attribute of the type to do the actual communication. Like with Spring REST, there are specific implementations for each HTTP client library. For Apache HttpComponents HttpClient, this is the It accepts an org.apache.http.client.HttpClient to use for low-level communication.

Your application must provide a bean instance of the type WebServiceGatewaySupport. On this object, you can set an instance of a WebServiceMessageSender.

public Jaxb2Marshaller marshaller() {
    Jaxb2Marshaller marshaller = new Jaxb2Marshaller();
    return marshaller;

public MyClient myClientSecure(Jaxb2Marshaller marshaller) {
    MyClient client = new MyClient(properties);
    String url = properties.getRemoteServiceEndpointUrl();
    client.setMessageSender(new HttpComponentsMessageSender(client));
    return client;

Like in the Spring REST example, client must be an instance of Apache’s HttpComponents HttpClient, eg. the CloseableHttpClient we created earlier.

Calling a service with the of our MyClient bean now uses the configured keystore and truststore. You can call a SOAP endpoint with getWebServiceTemplate().marshalSendAndReceive(...).

Please note that our MyClient class extends WebServiceGatewaySupport. The code snippet below also includes a sample call. RequestType and ResponseType are classes generated from the wsdl file and typically reside in the target/generated-sources directory of your project.

public class MyClient extends WebServiceGatewaySupport {
    public ResponseType getMonthlyAlertDetail(BigInteger alertId, String apiKey) {
        return JAXBElement<ResponseType> response = (JAXBElement<ResponseType>) getWebServiceTemplate()
                .marshalSendAndReceive(new RequestType(...), message -> ((SoapMessage) message).setSoapAction("SoapOperationName"));

Using the keystore in Keycloak

If you’re using a product like eg. Keycloak on your server, the way of using the certificate stays the same. It’s even easier, as you don’t need to write code to read the .keystore file. You can point to the .keystore file in the configuration files for that product.

This is an example Keycloak configuration in the standalone.xml file:

<security-realm name="ApplicationRealm">
            <keystore path="/tmp/" relative-to="jboss.server.config.dir" keystore-password="changeit" alias="" key-password="changeit" generate-self-signed-certificate-host="localhost"/>


Ken is the Business Unit Manager of Ordina JWorks. Aside from his day-to-day occupation as a Business Unit Manager, he is also Backend Practice Manager, passionate about all Java- and JavaScript related technologies. In this capacity, he narrows the gap between consultants and potential innovative customer projects. He does this by organizing workshops, talks and courses about the newest technologies, whereby people can grow in their role as a software consultant.