table of contents
pki-cert(1) | PKI Certificate Management Commands | pki-cert(1) |
NAME¶
pki-cert - Command-Line Interface for managing certificates on the Certificate System server.
SYNOPSIS¶
pki [CLI options] <subsystem>-cert pki [CLI options] <subsystem>-cert-find [command options] pki [CLI options] <subsystem>-cert-show <certificate ID> [command options] pki [CLI options] <subsystem>-cert-revoke <certificate ID> [command options] pki [CLI options] <subsystem>-cert-hold <certificate ID> [command options] pki [CLI options] <subsystem>-cert-release-hold <certificate ID> [command options] pki [CLI options] <subsystem>-cert-request-profile-find [command options] pki [CLI options] <subsystem>-cert-request-profile-show <profile ID> [command options] pki [CLI options] <subsystem>-cert-request-submit [command options] pki [CLI options] <subsystem>-cert-request-review <request ID> [command options]
DESCRIPTION¶
The pki-cert commands provide command-line interfaces to manage certificates on the specified subsystem.
Valid subsystems are ca and tps. If the <subsystem>- prefix is omitted, it will default to ca.
pki [CLI options] <subsystem>-cert
pki [CLI options] <subsystem>-cert-find [command options]
pki [CLI options] <subsystem>-cert-show <certificate ID> [command options]
pki [CLI options] <subsystem>-cert-revoke <certificate ID>
pki [CLI options] <subsystem>-cert-hold <certificate ID>
pki [CLI options] <subsystem>-cert-release-hold <certificate ID>
pki [CLI options] <subsystem>-cert-request-profile-find [command options]
pki [CLI options] <subsystem>-cert-request-profile-show <profile ID> [command options]
pki [CLI options] <subsystem>-cert-request-submit [command options]
pki [CLI options] <subsystem>-cert-request-review <request ID> [command options]
OPTIONS¶
The CLI options are described in pki(1).
OPERATIONS¶
To view available certificate commands, type pki <subsystem>-cert. To view each command's usage, type pki <subsystem>-cert-<command> --help.
Viewing Certificates¶
Certificates can be viewed anonymously.
To list all certificates in the CA:
pki ca-cert-find
It is also possible to search for and list specific certificates by adding a search filter. Use pki ca-cert-find --help to see options. For example, to search based on issuance date:
pki ca-cert-find --issuedOnFrom 2012-06-15
To list certificates with search constraints defined in a file:
pki ca-cert-find --input <filename>
where the file is in the following format:
-
<?xml version="1.0" encoding="UTF-8" standalone="yes"?> <CertSearchRequest>
<serialNumberRangeInUse>true</serialNumberRangeInUse>
<serialFrom></serialFrom>
<serialTo></serialTo>
<subjectInUse>false</subjectInUse>
<eMail></eMail>
<commonName></commonName>
<userID></userID>
<orgUnit></orgUnit>
<org></org>
<locality></locality>
<state></state>
<country></country>
<matchExactly>false</matchExactly>
<status></status>
<revokedByInUse>false</revokedByInUse>
<revokedBy></revokedBy>
<revokedOnFrom>false</revokedOnFrom>
<revokedOnTo></revokedOnTo>
<revocationReasonInUse>false</revocationReasonInUse>
<revocationReason></revocationReason>
<issuedByInUse>false</issuedByInUse>
<issuedBy></issuedBy>
<issuedOnInUse>false</issuedOnInUse>
<issuedOnFrom></issuedOnFrom>
<issuedOnTo></issuedOnTo>
<validNotBeforeInUse>false</validNotBeforeInUse>
<validNotBeforeFrom></validNotBeforeFrom>
<validNotBeforeTo></validNotBeforeTo>
<validNotAfterInUse>false</validNotAfterInUse>
<validNotAfterFrom></validNotAfterFrom>
<validNotAfterTo></validNotAfterTo>
<validityLengthInUse>false</validityLengthInUse>
<validityOperation></validityOperation>
<validityCount></validityCount>
<validityUnit></validityUnit>
<certTypeInUse>false</certTypeInUse>
<certTypeSubEmailCA></certTypeSubEmailCA>
<certTypeSubSSLCA></certTypeSubSSLCA>
<certTypeSecureEmail></certTypeSecureEmail> </CertSearchRequest>
To view a particular certificate:
pki ca-cert-show <certificate ID>
Revoking Certificates¶
Revoking, holding, or releasing a certificate must be executed as an agent user. To revoke a certificate:
pki <agent authentication> ca-cert-revoke <certificate ID>
To place a certificate on hold temporarily:
pki <agent authentication> ca-cert-hold <certificate ID>
To release a certificate that has been placed on hold:
pki <agent authentication> ca-cert-release-hold <certificate ID>
Certificate Requests¶
To request a certificate, first generate a certificate signing request (CSR), then submit it with a certificate profile. The list of available profiles can be viewed using the following command:
pki ca-cert-request-profile-find
To generate a CSR, use the certutil, PKCS10Client, or CRMFPopClient, and store it into a file.
Basic requests can be submitted using the following command:
pki ca-cert-request-submit --profile <profile ID> --request-type <type> --csr-file <CSR file> --subject <subject DN>
To submit more advanced requests, download a template of the request file for a particular profile using the following command:
pki ca-cert-request-profile-show <profile ID> --output <request file>
Then, edit the request file, fill in the input attributes required by the profile, and submit the request using the following command:
pki ca-cert-request-submit <request file>
Depending on the profile, the command may require authentication (see the profile configuration file). The CLI currently supports client certificate authentication and directory-based authentication.
Also depending on the profile, an agent may need to review and approve the request by running the following command:
pki <agent authentication> ca-cert-request-review <request ID> --file <file to store the certificate request>
The --file <filename> and --action <action> options are mutually exclusive (i. e. - only one or the other may be specified during command invocation).
If the --file <filename> option is specified, the certificate request, as well as the defaults and constraints of the enrollment profile, will be retrieved and stored in the output file provided by the --file option. The agent can examine the file and override any values if necessary. To process the request, enter the appropriate action when prompted:
Action (approve/reject/cancel/update/validate/assign/unassign):
The request in the file will be read in, and the specified action will be applied against it.
Alternatively, when no changes to the request are necessary, the agent can process the request in a single step using the --action <action> option with the following command:
pki <agent authentication> ca-cert-request-review <request ID> --action <action>
AUTHORS¶
Ade Lee <alee@redhat.com>, Endi Dewata <edewata@redhat.com>, and Matthew Harmsen <mharmsen@redhat.com>.
COPYRIGHT¶
Copyright (c) 2014 Red Hat, Inc. This is licensed under the GNU General Public License, version 2 (GPLv2). A copy of this license is available at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
May 5, 2014 | version 10.2 |