The keystore used by WAS must include CA certificates.
I will share how to make a keystore that I used.
(Create keystore file)
1. Create a keystore in PKCS12 format with CA certificates.
keytool -importcert -keystore [keystore file name] -storepass [password] -storetype PKCS12 -alias rootca -file [Root CA Certification]
keytool -importcert -keystore [keystore file name] -storepass [password] -storetype PKCS12 -alias root -file [CA Certification]
2. Convert the SSL certificate to PKCS12 format.
openssl pkcs12 -export -in [public key file] -inkey [private key file] -out [cert file name] -name [Any Name]
3. Import certificate in PKCS12 format to keystore
keytool -importkeystore -deststorepass [password] -destkeypass [password] -destkeystore [keystore file name] -srckeystore [cert file name] -srcstoretype PKCS12 -srcstorepass [password] -alias [Any Name]
ex)
[Certification]
RootCA : USERTrustRSAAddTrustCA.der
CA : SectigoRSADomainValidationSecureServerCA.der
Public Key : public.key
Private Key : private.key
[Command]
keytool -importcert -keystore keystore.jks -storepass Password1! -storetype PKCS12 -alias rootca -file USERTrustRSAAddTrustCA.der
keytool -importcert -keystore keystore.jks -storepass Password1! -storetype PKCS12 -alias root -file SectigoRSADomainValidationSecureServerCA.der
openssl pkcs12 -export -in public.key -inkey private.key -out mscanning.p12 -name mscanning12
keytool -importkeystore -deststorepass Password1! -destkeypass Password1! -destkeystore keystore.jks -srckeystore mscanning.p12 -srcstoretype PKCS12 -srcstorepass Password1! -alias mscannings