Securely Exporting Private Keys with jksExportKey: Dos and Don’ts

Automating Certificate Exports with jksExportKey in CI/CD Pipelines

Automating certificate exports is essential for secure, repeatable deployments. This guide shows how to integrate jksExportKey into CI/CD pipelines to export keys and certificates from Java KeyStores (JKS) safely and reliably.

Why automate certificate exports?

  • Consistency: Eliminates manual steps and reduces human error.
  • Speed: Enables rapid, repeatable deployments across environments.
  • Auditability: Keeps a traceable, versioned process for key handling.

Prerequisites

  • A JKS file containing the certificate/private key to export.
  • jksExportKey installed or available in the build agent environment.
  • CI runner with secure secret storage (pipeline secrets, vault, encrypted variables).
  • Minimal CLI tooling: openssl, keytool (for verification), and shell available in pipeline image.

Security considerations (brief)

  • Store keystore passwords and key aliases as pipeline secrets—never hardcode.
  • Limit access to artifacts that contain private keys; rotate keys if exposed.
  • Prefer short-lived certificates where possible.

Basic jksExportKey command

Assuming jksExportKey accepts typical parameters:

  • keystore path
  • keystore password
  • alias
  • output file
  • output password (if exporting as a password-protected PKCS#12 or similar)

Example CLI pattern (replace variables with secure pipeline env vars):

Code

jksExportKey –keystore “\(JKS_PATH" --storepass "\)JKS_PASSWORD” –alias “\(KEY_ALIAS" --out "\)EXPORT_PATH” –outpass “\(EXPORT_PASS" </span></code></div></div></pre> <h3>Example: GitHub Actions workflow</h3> <p>This example demonstrates exporting a key during a deployment job. Store secrets in GitHub Secrets: JKS_BASE64, JKS_PASSWORD, KEY_ALIAS, EXPORT_PASS.</p> <ol> <li>Decode and write the keystore (keystore stored base64 in secret):</li> </ol> <pre><div class="XG2rBS5V967VhGTCEN1k"><div class="nHykNMmtaaTJMjgzStID"><div class="HsT0RHFbNELC00WicOi8"><i><svg width="16" height="16" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill="currentColor" fill-rule="evenodd" clip-rule="evenodd" d="M15.434 7.51c.137.137.212.311.212.49a.694.694 0 0 1-.212.5l-3.54 3.5a.893.893 0 0 1-.277.18 1.024 1.024 0 0 1-.684.038.945.945 0 0 1-.302-.148.787.787 0 0 1-.213-.234.652.652 0 0 1-.045-.58.74.74 0 0 1 .175-.256l3.045-3-3.045-3a.69.69 0 0 1-.22-.55.723.723 0 0 1 .303-.52 1 1 0 0 1 .648-.186.962.962 0 0 1 .614.256l3.541 3.51Zm-12.281 0A.695.695 0 0 0 2.94 8a.694.694 0 0 0 .213.5l3.54 3.5a.893.893 0 0 0 .277.18 1.024 1.024 0 0 0 .684.038.945.945 0 0 0 .302-.148.788.788 0 0 0 .213-.234.651.651 0 0 0 .045-.58.74.74 0 0 0-.175-.256L4.994 8l3.045-3a.69.69 0 0 0 .22-.55.723.723 0 0 0-.303-.52 1 1 0 0 0-.648-.186.962.962 0 0 0-.615.256l-3.54 3.51Z"></path></svg></i><p class="li3asHIMe05JPmtJCytG wZ4JdaHxSAhGy1HoNVja cPy9QU4brI7VQXFNPEvF">Code</p></div><div class="CF2lgtGWtYUYmTULoX44"><button type="button" class="st68fcLUUT0dNcuLLB2_ ffON2NH02oMAcqyoh2UU MQCbz04ET5EljRmK3YpQ CPXAhl7VTkj2dHDyAYAf" data-copycode="true" role="button" aria-label="Copy Code"><svg viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill="currentColor" fill-rule="evenodd" clip-rule="evenodd" d="M9.975 1h.09a3.2 3.2 0 0 1 3.202 3.201v1.924a.754.754 0 0 1-.017.16l1.23 1.353A2 2 0 0 1 15 8.983V14a2 2 0 0 1-2 2H8a2 2 0 0 1-1.733-1H4.183a3.201 3.201 0 0 1-3.2-3.201V4.201a3.2 3.2 0 0 1 3.04-3.197A1.25 1.25 0 0 1 5.25 0h3.5c.604 0 1.109.43 1.225 1ZM4.249 2.5h-.066a1.7 1.7 0 0 0-1.7 1.701v7.598c0 .94.761 1.701 1.7 1.701H6V7a2 2 0 0 1 2-2h3.197c.195 0 .387.028.57.083v-.882A1.7 1.7 0 0 0 10.066 2.5H9.75c-.228.304-.591.5-1 .5h-3.5c-.41 0-.772-.196-1-.5ZM5 1.75v-.5A.25.25 0 0 1 5.25 1h3.5a.25.25 0 0 1 .25.25v.5a.25.25 0 0 1-.25.25h-3.5A.25.25 0 0 1 5 1.75ZM7.5 7a.5.5 0 0 1 .5-.5h3V9a1 1 0 0 0 1 1h1.5v4a.5.5 0 0 1-.5.5H8a.5.5 0 0 1-.5-.5V7Zm6 2v-.017a.5.5 0 0 0-.13-.336L12 7.14V9h1.5Z"></path></svg>Copy Code</button><button type="button" class="st68fcLUUT0dNcuLLB2_ WtfzoAXPoZC2mMqcexgL ffON2NH02oMAcqyoh2UU MQCbz04ET5EljRmK3YpQ GnLX_jUB3Jn3idluie7R"><svg fill="none" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"><path fill="currentColor" fill-rule="evenodd" d="M20.618 4.214a1 1 0 0 1 .168 1.404l-11 14a1 1 0 0 1-1.554.022l-5-6a1 1 0 0 1 1.536-1.28l4.21 5.05L19.213 4.382a1 1 0 0 1 1.404-.168Z" clip-rule="evenodd"></path></svg>Copied</button></div></div><div class="mtDfw7oSa1WexjXyzs9y" style="color: var(--sds-color-text-01); font-family: var(--sds-font-family-monospace); direction: ltr; text-align: left; white-space: pre; word-spacing: normal; word-break: normal; font-size: var(--sds-font-size-label); line-height: 1.2em; tab-size: 4; hyphens: none; padding: var(--sds-space-x02, 8px) var(--sds-space-x04, 16px) var(--sds-space-x04, 16px); margin: 0px; overflow: auto; border: none; background: transparent;"><code class="language-text" style="color: rgb(57, 58, 52); font-family: Consolas, "Bitstream Vera Sans Mono", "Courier New", Courier, monospace; direction: ltr; text-align: left; white-space: pre; word-spacing: normal; word-break: normal; font-size: 0.9em; line-height: 1.2em; tab-size: 4; hyphens: none;"><span>- name: Decode keystore </span>run: echo "\){{ secrets.JKSBASE64 }}” | base64 –decode > keystore.jks
  1. Run jksExportKey:

Code

- name: Export certificate run: |

jksExportKey --keystore "keystore.jks" --storepass "${{ secrets.JKS_PASSWORD }}"    --alias "${{ secrets.KEY_ALIAS }}" --out "exported.p12" --outpass "${{ secrets.EXPORT_PASS }}" 

  1. Verify and use the exported artifact (example: convert to PEM for a service):

Code

- name: Convert to PEM run: |

openssl pkcs12 -in exported.p12 -passin pass:"${{ secrets.EXPORT_PASS }}" -nodes    -out exported.pem 

Example: GitLab CI job

.gitlab-ci.yml job snippet using protected variables (JKS_BASE64, JKS_PASSWORD, KEY_ALIAS, EXPORTPASS):

Code

export_cert: image: alpine:latest script:

- apk add --no-cache openssl - echo "$JKS_BASE64" | base64 -d > keystore.jks - jksExportKey --keystore keystore.jks --storepass "$JKS_PASSWORD" --alias "$KEY_ALIAS" --out exported.p12 --outpass "$EXPORT_PASS" - openssl pkcs12 -in exported.p12 -passin pass:"$EXPORT_PASS" -nodes -out exported.pem 

artifacts:

paths:   - exported.p12   - exported.pem 

only:

- tags 

Handling multiple environments and aliases

  • Use environment-specific secrets (e.g., JKS_STAGING_BASE64, JKS_PROD_BASE64).
  • Parameterize alias and output names using pipeline variables.
  • For multiple aliases, loop over a list in the job script