Whatever message this page gives is out now! Go check it out!
<APIManagerHome>/conf. The config.xml file, located in the same location, contains the following lines:<https enabled="false"> <port>9500</port> <ssl ref="${sys:apim.home}/conf/portalsslconfig.xml"/></https>keytool -keystore keystore -alias portal -genkey -keyalg RSA<keystore>
<path>The keystore path where the server certificate and key is present</path>
<type>The keystore type, for example, jks or pkcs12.</type>
<password>The keystore password</password>
<alias>The key alias to choose as server certificate. If the keystore contains multiple aliases, you can select the specific alias by specifying here.</alias>
<keypassword>The key password that is used to extract the private key stored at the specified alias. If you do not specify the alias, the JVM chooses the first key as alias.</keypassword>
</keystore><keystore>
<path>/path/to/keystore</path>
<type>jks</type>
<password>keyspassword</password>
<alias>portal</alias>
<keypassword>aliaspassword</keypassword>
</keystore><truststore>
<path>/trust/store/path</path>
<type>jks</type>
<password>tspassword</password>
</truststore>
<clientauth>true</clientauth><protocols>
<value>TLSv1.2</value>
<value>TLSv1.1</value>
<value>TLSv1</value>
</protocols><ciphersuites>
<excluded>
<value>.*NULL.*</value>
<value>.*RC4.*</value>
<value>.*MD5.*</value>
<value>.*DES.*</value>
<value>.*DSS.*</value>
<Item>.*_RSA_.*MD5$</Item>
</excluded>
<included>
<value>TLS_DHE_RSA.*</value>
<value>TLS_ECDHE.*</value>
</included>
</ciphersuites><https enabled="true">
<port>9500</port>
<ssl ref="${sys:apim.home}/conf/portalsslconfig.xml"/>
</https>https://<servername>:9500/admin.html