table of contents
pki-client(1) | PKI Client Security Database Management Commands | pki-client(1) |
NAME¶
pki-client - Command-Line Interface for managing the security database on Certificate System client.
SYNOPSIS¶
pki [CLI options] client pki [CLI options] client-init [command options] pki [CLI options] client-cert-find [command options] pki [CLI options] client-cert-request [subject DN] [command options] pki [CLI options] client-cert-import [nickname] [command options] pki [CLI options] client-cert-mod <nickname> [command options] pki [CLI options] client-cert-show <nickname> [command options] pki [CLI options] client-cert-del <nickname> [command options]
DESCRIPTION¶
The pki-client commands provide command-line interfaces to manage the security database on the client's machine.
pki [CLI options] client
pki [CLI options] client-init [command options]
pki [CLI options] client-cert-find [command options]
pki [CLI options] client-cert-request [subject DN] [command options]
pki [CLI options] client-cert-import [nickname] [command options]
pki [CLI options] client-cert-mod <nickname> [command options]
pki [CLI options] client-cert-show <nickname> [command options]
pki [CLI options] client-cert-del <nickname> [command options]
OPTIONS¶
The CLI options are described in pki(1).
OPERATIONS¶
To view available client commands, type pki client. To view each command's usage, type pki client-<command> --help.
To create a new database execute the following command:
pki -d <security database location> -c <security database password> client-init
To list certificates in the security database:
pki -d <security database location> -c <security database password> client-cert-find
To request a certificate:
pki -d <security database location> -c <security database password> client-cert-request [subject DN]
The subject DN requirement depends on the certificate profile being requested. Some profiles may require the user to provide a subject DN in a certain format. Some other profiles may generate their own subject DN.
Certain profiles may also require additional authentication. To authenticate, a username and a password can be specified using the --username and --password options, respectively. If the subject DN is not specififed the CLI may use the username to generate a default subject DN "UID=<username>".
To import a certificate from a file into the security database:
pki -d <security database location> -c <security database password> client-cert-import <nickname> --cert <path>
To import a CA certificate from a file into the security database:
pki -d <security database location> -c <security database password> client-cert-import <nickname> --ca-cert <path>
To import certificates and private keys from a PKCS #12 file into the security database:
pki -d <security database location> -c <security database password> client-cert-import --pkcs12 <path> --pkcs12-password <password>
To import a certificate from CA server into the security database:
pki -d <security database location> -c <security database password> client-cert-import <nickname> --serial <serial number>
To import a CA certificate from CA server into the security database:
pki -d <security database location> -c <security database password> client-cert-import <nickname> --ca-server
To modify a certificate's trust attributes in the security database:
pki -d <security database location> -c <security database password> client-cert-mod <nickname> --trust <trust attributes>
To display a certificate in the security database:
pki -d <security database location> -c <security database password> client-cert-show <nickname>
To export a certificate from the security database into a PEM file:
pki -d <security database location> -c <security database password> client-cert-show <nickname> --cert <path>
To export a certificate chain with the private key from the security database into a PKCS #12 file:
pki -d <security database location> -c <security database password> client-cert-show <nickname> --pkcs12 <path> --pkcs12-password <password>
To export a certificate chain with the private key with a password file:
pki -d <security database location> -c <security database password> client-cert-show <nickname> --pkcs12 <path> --pkcs12-password-file <path>
To export a client certificate with the private key from the security database into a PEM file:
pki -d <security database location> -c <security database password> client-cert-show <nickname> --client-cert <path>
To delete a certificate from the security database:
pki -d <security database location> -c <security database password> client-cert-del <nickname>
AUTHORS¶
Ade Lee <alee@redhat.com>, Endi Dewata <edewata@redhat.com>, and Matthew Harmsen <mharmsen@redhat.com>.
COPYRIGHT¶
Copyright (c) 2014 Red Hat, Inc. This is licensed under the GNU General Public License, version 2 (GPLv2). A copy of this license is available at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
May 5, 2014 | version 10.2 |