Jump between JKS and PEM without wrangling keytool
Pick the direction, drop your keystore or PEM assets, and the service will orchestrate keytool and openssl with isolated workspaces, AES-256 defaults, and transparent warnings for chains, aliases, and passphrases.
Upload & configure
Safety brief
Isolated workspace. Every upload lands inside a disposable folder under `converter.workspace.dir` and is deleted immediately after artifacts stream back.
Passphrase policy. Store/alias passwords remain in memory only; new passphrases enforce an eight-character minimum before openssl is invoked.
Chain control. Leaf-only and chain toggles let you decide what to download. Strict audits can verify CA presence through the warnings list.
Tooling parity. The workflow shells out to the system `keytool` and `openssl` binaries so results match what ops teams execute on hardened bastions.