1SGE_CA(8)             Grid Engine Administrative Commands            SGE_CA(8)
2
3
4

NAME

6       util/sgeCA/sge_ca - Grid Engine CSP Support control command
7

SYNTAX

9       sge_ca command [command options]
10

DESCRIPTION

12       sge_ca controls a simple Grid Engine Certificate Authority that is used
13       for the special Certificate Security Protocol  (CSP)  mode.   CSP  mode
14       improves  the  security  behavior  of  Grid  Engine by enabling OpenSSL
15       secured communication channels and X509v3 certificates for  authentica‐
16       tion.  In addition it is possible to export the key material or to cre‐
17       ate JKS keystores for the JMX connector.  It follows a list of possible
18       commands and command options to give an overview which functionality is
19       available. For further details about every command refer to the COMMAND
20       DETAILS section.
21

COMMAND OVERVIEW

23       sge_ca [-help]
24              show usage
25
26       sge_ca -init [command options]
27              create  the  infrastructure  for  a  new Grid Engine Certificate
28              Authority with its corresponding files and directories and a set
29              of keys and certificates for SGE Daemon, root and admin user.
30
31       sge_ca -req | -verify <cert> | -sign | -copy [command options]
32              manipulate individual keys and certificates
33
34       sge_ca -print <cert> | -printkey <key> | -printcrl <crl>
35              print out certificates, keys and certificate revocation lists in
36              human readable form.
37
38       sge_ca -showCaTop | -showCaLocalTop [command options]
39              echo the $CATOP or $CALOCALTOP directory. This command  is  usu‐
40              ally  run  as root on the qmaster host after a CA infrastructure
41              has been created. If "-cadir" or "-catop" or  "-calocaltop"  are
42              set the corresponding directories are printed.
43
44       sge_ca  -usercert  <user  file>  |  -user <u:g:e> | -sdm_daemon <u:g:e>
45       [command options]
46              are used for creation of certificates and keys for  a  bunch  of
47              users  contained  in  <user  file>,  a single user or SDM daemon
48              <u:g:e>. (see hedeby_introduction(1) )
49
50       sge_ca -pkcs12 <user> | -sdm_pkcs12 <g> | -sys_pkcs12 [command options]
51              are used to export the certificate and key for  user  <user>  or
52              SDM  daemon  <g>  in  pkcs12 format and to export the SGE Daemon
53              certificate and key in pkcs12 format.
54
55       sge_ca -userks | -ks <user> | -sysks [command options]
56              are used for creation of keystore for all users with a  certifi‐
57              cate and key, the keystore for a single user <user> and the key‐
58              store containing the SGE Daemon certificate and key.
59
60       sge_ca -renew <user> | -renew_ca | -renew_sys | -renew_sdm <g> [command
61       options]
62              are  used  to  renew  the  corresponding  certificates  for user
63              <user>, for the CA, for the SGE Daemon certificate and  for  the
64              SDM daemon <g> certificate.
65
66       where  "[command  options]"  is  a combination of the following options
67       depending on the command. The COMMAND DETAILS  section  explains  which
68       options are usable for each command.
69
70       -days <days>
71              days of validity of the certificate
72
73       -sha1  use sha-1 instead of md5 as message digest
74
75       -encryptkey
76              use  des to encrypt the generated private key with a passphrase.
77              The passphrase is requested when a key is created or used.
78
79       -outdir <dir>
80              write to directory <dir>
81
82       -cahost <host>
83              define CA hostname (CA master host)
84
85       -cadir <dir>
86              define $CALOCALTOP and $CATOP settings
87
88       -calocaltop <dir>
89              define $CALOCALTOP setting
90
91       -catop <dir>
92              define $CATOP setting
93
94       -kspwf <file>
95              define a keystore password file that contains a password that is
96              used to encrypt the keystore and the keys contained therein
97
98       -ksout <file>
99              define output file to write the keystore to
100
101       -pkcs12pwf <file>
102              define  a  pkcs12 password file that contains a password that is
103              used to encrypt the pkcs12 export file and  the  keys  contained
104              therein
105
106       -pkcs12dir <dir>
107              define  the  output directory <dir> to write the exported pkcs12
108              format file to. Otherwise the current working directory is used.
109

COMMAND DETAILS

111       sge_ca -init [-cadir <dir>] [-catop <dir>] [-calocaltop <dir>]  [-admi‐
112       nuser <admin>] [-days <num days>]
113              The  -init command creates a new Grid Engine certificate author‐
114              ity and its corresponding files. Usually "sge_ca -init"  is  run
115              by  user  root  on  the master host.  If the options -adminuser,
116              -cadir, -calocaltop, -catop  and  the  Grid  Engine  environment
117              variables SGE_ROOT, SGE_CELL and SGE_QMASTER_PORT are set the CA
118              directories are created in the following locations:
119              two letter country code,  state,  location,  e.g  city  or  your
120              buildingcode,  organization  (e.g. your company name), organiza‐
121              tional unit, e.g. your  department,  email  address  of  the  CA
122              administrator (you!)
123
124              Certificates  and  keys are generated for the CA itself, for SGE
125              Daemon, for GE install user (usually root) and finally  for  the
126              GE admin user.
127
128              How  and  where  the  certificates  and  keys are created can be
129              influenced additionally by:
130              -days <days> change the time of validity of the certificates  to
131              number of <days> instead of 365 days
132              -sha1 change the message digest algorithm from md5 to sha-1
133              -encryptkey encrypt the generated keys with a passphrase
134              -adminuser <user> use <user> as admin user
135              -cahost <host> use <host> as the CA master host
136              [-cadir  <dir>] [-catop <dir> [-calocaltop <dir>] set $CATOP and
137              $CALOCALTOP to <dir> to use something different  than  the  Grid
138              Engine default directories. Either -cadir <dir> has to be speci‐
139              fied to replace $CATOP and $CALOCALTOP by the same directory  or
140              -catop <dir> for $CATOP and -calocaltop <dir> for $CALOCALTOP.
141
142       sge_ca  -user <u:g:e> [-cadir <dir>] [-catop <dir>] [-calocaltop <dir>]
143       [-adminuser <admin>] [-days <days>]
144              generate certificate and keys  for  <u:g:e>  with  u='Unix  user
145              account name', g='common name' and e='email address'. By default
146              the certificate is valid for 365 days  or  by  <days>  specified
147              with  -days <days>.  This command is usually run as user root on
148              the qmaster host. $CATOP  and  $CALOCALTOP  maybe  overruled  by
149              -cadir, -catop and -calocaltop.
150
151       sge_ca -sdm_daemon <u:g:e>
152              generate  daemon  certificate  and keys for <u:g:e> with u='Unix
153              user account name', g='common name' and  e='email  address'.  By
154              default the certificate is valid for 365 days or by <days> spec‐
155              ified with "-days <days>". This command is usually run  as  user
156              root on the qmaster host.
157
158       sge_ca -usercert <user file> [-cadir <dir>] [-catop <dir>] [-calocaltop
159       <dir>] [-adminuser <admin>] [-days <days>] [-encryptkey] [-sha1]
160              Usually sge_ca -usercert <user file> is run as user root on  the
161              master  host.  The argument <user file> contains a list of users
162              in the following format:
163
164                eddy:Eddy Smith:eddy@griders.org
165                sarah:Sarah Miller:sarah@griders.org
166                leo:Leo Lion:leo@griders.org
167
168              where the fields separated by colon are:
169                Unix user:Gecos field:email address
170
171       sge_ca -renew <user> [-cadir <dir>] [-catop <dir>] [-calocaltop  <dir>]
172       [-adminuser <admin>] [-days <days>]
173              Renew  the certificate for <user>. By default the certificate is
174              extended for 365 days or by <days> specified with -days  <days>.
175              If  the value is negative the certificate becomes invalid.  This
176              command is usually run as user root on the qmaster host.  $CATOP
177              and  $CALOCALTOP maybe overruled by -cadir, -catop and -calocal‐
178              top.
179
180       sge_ca -renew_ca [-cadir  <dir>]  [-catop  <dir>]  [-calocaltop  <dir>]
181       [-adminuser <admin>] [-days <days>]
182              Renew the CA certificate. By default the certificate is extended
183              for 365 days or by <days> specified with -days  <days>.  If  the
184              value is negative the certificate becomes invalid.  This command
185              is usually run as user root on  the  qmaster  host.  $CATOP  and
186              $CALOCALTOP maybe overruled by -cadir, -catop and -calocaltop.
187
188       sge_ca  -renew_sys  [-cadir  <dir>]  [-catop <dir>] [-calocaltop <dir>]
189       [-adminuser <admin>] [-days <days>]
190              Renew the SGE Daemon certificate. By default the certificate  is
191              extended  for 365 days or by <days> specified with -days <days>.
192              If the value is negative the certificate becomes invalid.   This
193              command  is usually run as user root on the qmaster host. $CATOP
194              and $CALOCALTOP maybe overruled by -cadir, -catop and  -calocal‐
195              top.
196
197       sge_ca -renew_sdm <g> [-cadir <dir>] [-catop <dir>] [-calocaltop <dir>]
198       [-adminuser <admin>] [-days <days>]
199              Renew the SDM daemon certificate of <g>, where <g> is the common
200              name  of  the daemon. By default the certificate is extended for
201              365 days or by <days> specified with -days <days>. If the  value
202              is  negative  the  certificate becomes invalid.  This command is
203              usually run as user root on the qmaster host. $CATOP and  $CALO‐
204              CALTOP maybe overruled by -cadir, -catop and -calocaltop.
205
206       sge_ca  -pkcs12  <user>  [-pkcs12pwf <file>] [-pkcs12dir <dir>] [-cadir
207       <dir>] [-catop <dir>] [-calocaltop <dir>] [-adminuser <admin>]
208              export certificate and key of user <user> 'the Unix  user  name'
209              in  pkcs12  format.  This command is usually run as user root on
210              the qmaster host. If -pkcs12pwf <file> is used the file and  the
211              corresponding key will be encrypted with the password in <file>.
212              If -pkcs12dir <dir> is used the  output  file  is  written  into
213              <dir>/<user>.p12  instead of ./<user>.p12 . $CATOP and $CALOCAL‐
214              TOP maybe overruled by -cadir, -catop and -calocaltop.
215
216       sge_ca  -sys_pkcs12  [-pkcs12pwf  <file>]  [-pkcs12dir  <dir>]  [-cadir
217       <dir>] [-catop <dir>] [-calocaltop <dir>] [-adminuser <admin>]
218              export  certificate and key of SGE Daemon in pkcs12 format. This
219              command is usually run as user root  on  the  qmaster  host.  If
220              -pkcs12pwf  <file>  is  used  the file and the corresponding key
221              will be encrypted with the password  in  <file>.  If  -pkcs12dir
222              <dir>  is  used the output file is written into <dir>/<user>.p12
223              instead of ./<user>.p12 . $CATOP and $CALOCALTOP maybe overruled
224              by -cadir, -catop and -calocaltop.
225
226       sge_ca  -sdm_pkcs12  <g> [-pkcs12pwf <file>] [-pkcs12dir <dir>] [-cadir
227       <dir>] [-catop <dir>] [-calocaltop <dir>] [-adminuser <admin>]
228              export certificate and key of  daemon  <g>  g='common  name'  in
229              pkcs12  format.  This command is usually run as user root on the
230              qmaster host. If -pkcs12pwf <file> is used the file and the cor‐
231              responding key will be encrypted with the password in <file>. If
232              -pkcs12dir <dir>  is  used  the  output  file  is  written  into
233              <dir>/<g>.p12  instead  of  ./<g>.p12  .  $CATOP and $CALOCALTOP
234              maybe overruled by -cadir, -catop and -calocaltop.
235
236       sge_ca -ks  <user>  [-ksout  <file>]  [-kspwf  <file>]  [-cadir  <dir>]
237       [-catop <dir>] [-calocaltop <dir>] [-adminuser <admin>]
238              create  a keystore containing certificate and key of user <user>
239              in JKS format where <user> is the Unix user name.  This  command
240              is  usually  run  as  user  root  on the qmaster host. If -kspwf
241              <file> is used the keystore and the corresponding  key  will  be
242              encrypted  with the password in <file>. The -ksout <file> option
243              specifies the keystore file  that  is  created.  If  the  -ksout
244              <file>  option  is missing the default location for the keystore
245              is $CALOCALTOP/userkeys/<user>/keystore. This command is usually
246              invoked  by  sge_ca -userks. A prerequisite is a valid JAVA_HOME
247              environment variable setting. $CATOP and $CALOCALTOP maybe over‐
248              ruled by -cadir, -catop and -calocaltop.
249
250       sge_ca -userks [-kspwf <file>] [-cadir <dir>] [-catop <dir>] [-calocal‐
251       top <dir>] [-adminuser <admin>]
252              generate a keystore in JKS format for all users having a key and
253              certificate.   This  command  is usually run as user root on the
254              qmaster host.  If -kspwf <file> is used  the  keystore  and  the
255              corresponding key will be encrypted with the password in <file>.
256              The    keystore    files    are     created     in     $CALOCAL‐
257              TOP/userkeys/<user>/keystore.  This  command  is  run after user
258              certificates and keys have been created  with  sge_ca  -usercert
259              <userfile>  or  if  any  of  the certificates have been renewed.
260              $CATOP and $CALOCALTOP maybe overruled  by  -cadir,  -catop  and
261              -calocaltop.
262
263       sge_ca  -sysks [-kspwf <file>] [-cadir <dir>] [-catop <dir>] [-calocal‐
264       top <dir>] [-adminuser <admin>]
265              generate a keystore containing the SGE  Daemon  certificate  and
266              key  in JKS format.  This command is usually run as user root on
267              the qmaster host.  If -kspwf <file> is used the keystore and the
268              corresponding key will be encrypted with the password in <file>.
269              The keystore file is  created  in  $CALOCALTOP/private/keystore.
270              $CATOP  and  $CALOCALTOP  maybe  overruled by -cadir, -catop and
271              -calocaltop.
272
273       sge_ca -print <cert>
274              Print a certificate where <cert> is the  corresponding  certifi‐
275              cate in pem format.
276
277       sge_ca -printkey <key>
278              Print a key where <key> is the corresponding key in pem format.
279
280       sge_ca -printcrl <crl>
281              Print  a  certificate  revocation list where <crl> is the corre‐
282              sponding certificate revocation list in pem format.
283
284       sge_ca -printcrl <crl>
285              Print a certificate revocation list where <crl>  is  the  corre‐
286              sponding certificate revocation list in pem format.
287
288       sge_ca  -req  [-cadir <dir>] [-catop <dir>] [-calocaltop <dir>] [-admi‐
289       nuser <admin>] [-days <days>] [-encryptkey] [-sha1] [-outdir <dir>]
290              create a private key and a certificate request for  the  calling
291              user.  This are created as newkey.pem and newreq.pem in the cur‐
292              rent working directory.  If the option -outdir <dir>  is  speci‐
293              fied in addition the files are created in <dir>.
294
295       sge_ca  -sign [-cadir <dir>] [-catop <dir>] [-calocaltop <dir>] [-admi‐
296       nuser <admin>] [-days <days>] [-encryptkey] [-sha1] [-outdir <dir>
297              Sign a certificate request.  The  CA  certificate  under  $CATOP
298              (default:  $SGE_ROOT/$SGE_CELL/common/sgeCA)  and  CA  key  from
299              $CALOCALTOP         (default:         /var/sgaCA/{port$SGE_QMAS‐
300              TER_PORT|sge_qmaster}/$SGE_CELL) are used for the signature.  If
301              $CATOP and $CALOCALTOP are set  to  a  different  directory  the
302              information  there  is  used.  The  certificate  is  created  as
303              newcert.pem in the current working directory or in <dir> if  the
304              option  -outdir <dir> has been specified. In addition the option
305              "-days <number of days>" can be specified to change the  default
306              validity from 365 to number of days.
307
308       sge_ca -verify <cert> [-cadir <dir>] [-catop <dir>] [-calocaltop <dir>]
309       [-adminuser <admin>]
310              Verify a certificates validity where <cert> is the corresponding
311              certificate  in  pem format. $CATOP and $CALOCALTOP can be over‐
312              ruled by -cadir, -catop and -calocaltop.
313
314       sge_ca -copy [-cadir <dir>] [-catop <dir>] [-calocaltop <dir>]
315              sge_ca -copy is run by a user to copy the users certificate  and
316              key    on   the   master   host   to   $HOME/.sge/port$SGE_QMAS‐
317              TER_PORT/$SGE_CELL/certs/cert.pem and the corresponding  private
318              key      in      $HOME/.sge/port$SGE_QMASTER_PORT/$SGE_CELL/pri‐
319              vate/key.pem which are used instead of the files in  $CATOP  and
320              $CALOCALTOP.  The  command  is only recommended for testing pur‐
321              poses or where $HOME is on a secure shared file system.
322

EXAMPLES

324       # sge_ca -init -cadir /tmp -sha1 -encryptkey -days 31
325              create a CA infrastructure in /tmp with a  certificate  validity
326              of 31 days using sha-1 instead of md5 as message digest.The keys
327              are encrypted and a passphrase has to be entered during the cre‐
328              ation of the different keys or during signing a certificate with
329              the created CA key.
330
331       # sge_ca -usercert /tmp/myusers.txt -cadir /tmp
332              /tmp/myusers.txt  contains  user1:My  User:user1@myorg.org   and
333              user1 is a valid Unix user account. Create a key and certificate
334              for user1.
335
336       # sge_ca -userks -cadir /tmp
337              create a keystore for all users of the simple CA.  The  keystore
338              is stored under /tmp/userkeys/<user>/keystore.
339
340       # sge_ca -renew root -cadir /tmp -days -1
341              make the root certificate temporarily invalid.
342
343       # sge_ca -renew_ca -days 365 -cadir /tmp
344              renew the CA certificate for 365 days
345

ENVIRONMENTAL VARIABLES

347       SGE_ROOT       Specifies  the location of the Grid Engine standard con‐
348                      figuration files.
349
350       SGE_CELL       If set, specifies the default Grid Engine cell.
351

RESTRICTIONS

353       sge_ca The command must be usually called with Grid Engine root permis‐
354       sions  on the master host.  For more details on the permission require‐
355       ments consult the  detailed  description  for  the  different  commands
356       above.
357

FILES

359       sge_ca  creates  a  file  tree  starting in $CATOP and $CALOCALTOP. The
360       default for $CATOP is usually $SGE_ROOT/$SGE_CELL/common/sgeCA and  for
361       $CALOCALTOP    /var/sgeCA/{port$SGE_QMASTER_PORT|sge_qmaster}/$SGE_CELL
362       where the subpaths beginning with $ expands to the content of the  cor‐
363       responding environment variable.
364
365       In  addition  there  may  optionally  exist  the  user  certificate  in
366       $HOME/.sge/port$SGE_QMASTER_PORT/$SGE_CELL/certs/cert.pem and the  cor‐
367       responding      private      key      in      $HOME/.sge/port$SGE_QMAS‐
368       TER_PORT/$SGE_CELL/private/key.pem which are used instead of the  files
369       in $CATOP and $CALOCALTOP. (see sge_ca -copy above)
370

SEE ALSO

372       ge_qmaster(8).
373
375       See ge_intro(1) for a full statement of rights and permissions.
376
377
378
379GE 6.2u5                 $Date: 2008/07/19 17:12:58 $                SGE_CA(8)
Impressum