If you want to access a WebDAV repository across an insecure network <oXygen/> allows you to load and save the documents over the HTTPS protocol (if the server understands this protocol) so that any data exchange with the WebDAV server is encrypted.
When a WebDAV repository is first accessed over HTTPS the server hosting the repository will present a security certificate as part of the HTTPS protocol, without any user intervention. <oXygen/> XML Author will use this certificate to decrypt any data stream received from the server. For the authentication to succeed you should make sure the security certificate of the server hosting the repository can be read by <oXygen/> XML Author . This means that <oXygen/> XML Author can find the certificate in the key store of the Java Runtime Environment in which it runs. You know the server certificate is not in the JRE's key store if you get the error "No trusted certificate found" when trying to access the WebDAV repository:
You can add a certificate to the key store by exporting it to a local file using any HTTPS-capable Web browser (for example Internet Explorer) and then importing this file into the JRE using the keytool executable bundled with the JRE. The steps are the following using Internet Explorer (if you use other browser the procedure is similar):
Procedure 4.3. Import a HTTPS server certificate
Export the certificate into a local file
Point your HTTPS-aware Web browser to the repository URL. If this is your first visit to the repository it will be displayed a security alert stating that the security certificate presented by the server is not trusted.
Press the button "View Certificate".
Select the "Details" tab.
Press the button "Copy to file ...". This will start the Certificate Export Wizard on Windows
Follow the indications of the wizard to save the certificate to a local
file, for example server.cer
.
Import the local file into the JRE running <oXygen/> Eclipse plugin
Open a text-mode console.
Go to the lib/security subdirectory of your JRE directory, that is of the directory where it is installed the JRE running <oXygen/> Eclipse plugin , for example on Windows C:\Program Files\Java\jre1.5.0_09\lib\security
Run the following command:..\..\bin\keytool.exe -import
-trustcacerts -file local-file.cer -keystore cacerts where
local-file.cer
is the file containing the server
certificate, created during the previous step. keytool requires a password
before adding the certificate to the JRE keystore. The default password is
"changeit". If somebody changed the default password then he is the only one who
can perform the import. As a workaround you can delete the
cacerts file, re-type the command and enter as password
any combination of at least 6 characters. This will set the password for future
operations with the key store.
Restart Eclipse