1certmonger(8) System Manager's Manual certmonger(8)
2
3
4
6 dogtag-submit
7
8
10 dogtag-submit -E EE-URL -A AGENT-URL [-d dbdir] [-n nickname] [-i
11 cainfo] [-C capath] [-c certfile] [-k keyfile] [-p pinfile] [-P pin]
12 [-s serial (hex)] [-D serial (decimal)] [-S state] [-T profile] [-O
13 param=value] [-N | -R] [-o option=value] [-a ] [-u username] [-U
14 userdn] [-W userpassword] [-w userpasswordfile] [-Y userpin] [-y user‐
15 pinfile] [-v] [csrfile]
16
17
19 dogtag-submit is the helper which certmonger can use to make certifi‐
20 cate enrollment and renewal requests to Dogtag servers. It is not nor‐
21 mally run interactively, but it can be for troubleshooting purposes.
22
23 The preferred option is to request a renewal of an already-issued cer‐
24 tificate, using its serial number, which can be read from a PEM-format‐
25 ted certificate provided in the CERTMONGER_CERTIFICATE environment
26 variable, or via the -s or -D option on the command line. If no serial
27 number is provided, then the client will attempt to obtain a new cer‐
28 tificate by submitting a signing request to the CA.
29
30 The signing request which is to be submitted should either be in a file
31 whose name is given as an argument, or fed into dogtag-submit via
32 stdin.
33
34 certmonger does not yet support retrieving trust information from Dog‐
35 tag CAs.
36
37
39 -E EE-URL
40 The top-level URL for the end-entity interface provided by the
41 CA, through which the initial enrollment request will be submit‐
42 ted. This is typically http://SERVER:EEPORT/ca/ee/ca.
43
44 -A AGENT-URL
45 The top-level URL for the agent interface provided by the CA,
46 through which the request can be approved using agent creden‐
47 tials. This is typically https://SERVER:AGENTPORT/ca/agent/ca.
48
49 -d dbdir -n nickname -c certfile -k keyfile
50 The location of the key and certificate which the client should
51 use to authenticate to the CA's agent interface. Exactly which
52 values are meaningful depend on which cryptography library your
53 copy of libcurl was linked with.
54
55 -p pinfile
56 The name of a file which contains a PIN/password which will be
57 needed in order to make use of the agent credentials.
58
59 -i cainfo -C capath
60 The location of a file containing a copy of the CA's certifi‐
61 cate, against which the CA server's certificate will be veri‐
62 fied, or a directory containing, among other things, such a
63 file.
64
65 -s serial
66 The serial number of an already-issued certificate for which the
67 client should attempt to obtain a new certificate, in hexadeci‐
68 mal form, if one can not be read from the CERTMONGER_CERTIFICATE
69 environment variable.
70
71 -D serial
72 The serial number of an already-issued certificate for which the
73 client should attempt to obtain a new certificate, in decimal
74 form, if one can not be read from the CERTMONGER_CERTIFICATE
75 environment variable.
76
77 -S state
78 A cookie value provided by a previous instance of this helper,
79 if the helper is being asked to continue a multi-step enrollment
80 process. If the CERTMONGER_COOKIE environment variable is set,
81 its value is used.
82
83 -T profile
84 The name of the type of certificate which the client should
85 request from the CA if it is not renewing a certificate (per the
86 -s option above). If the CERTMONGER_CA_PROFILE environment
87 variable is set, its value is used. Otherwise, the default
88 value is caServerCert.
89
90 -O param=value
91 An additional parameter to pass to the server when approving the
92 signing request using agent credentials. By default, any
93 server-supplied default settings are applied. This option can
94 be used either to override a server-supplied default setting, or
95 to supply one which would otherwise have not been used.
96 Requires the -A option.
97
98 -N Even if an already-issued certificate is available in the CERT‐
99 MONGER_CERTIFICATE environment variable, or a serial number has
100 been provided, don't attempt to renew a certificate using its
101 serial number. Instead, attempt to obtain a new certificate
102 using the signing request.
103
104 -R Negates the effect of the -N flag.
105
106 -t Instead of attempting to obtain a new certificate, query the
107 server for a list of the enabled enrollment profiles.
108
109 -o param=value
110 When initially submitting a request to the CA, add the specified
111 parameter and value along with any request parameters which
112 would otherwise be sent.
113
114 -a Use agent credentials, specified using some combination of the
115 -d, -n, -c, and -k flags, to authenticate to the CA when ini‐
116 tially submitting a request to the CA or retrieving the list of
117 enabled enrollment profiles. This is typically required when
118 the enrollment profile being used uses AgentCertAuth-based
119 authentication, and requires that the URL specified using the -E
120 flag be an HTTPS URL, or when the URL specified using the -E
121 flag is an HTTPS URL.
122
123 -u username
124 When initially submitting a request to the CA, supply the speci‐
125 fied value as a user name. This is typically required when the
126 enrollment profile being used uses UidPwdDirAuth-based or
127 NISAuth-based authentication.
128
129 -U userdn
130 When initially submitting a request to the CA, supply the speci‐
131 fied value as the DN (distinguished name) of the user's entry in
132 a directory server which the CA is configured to use for check‐
133 ing the user's password. This is typically required when the
134 enrollment profile being used uses UdnPwdDirAuth-based authenti‐
135 cation.
136
137 -W userpassword
138 When initially submitting a request to the CA, supply the speci‐
139 fied value as the password for the user whose name is specified
140 with the -u option, or whose DN is specified with the -U option.
141 This is typically only required when the enrollment profile
142 being used uses UidPwdDirAuth-based, UserPwdDirAuth-based, or
143 NISAuth-based authentication. If the URL specified using the -E
144 flag is not an HTTPS URL, this value will not be encrypted.
145
146 -w userpasswordfile
147 When initially submitting a request to the CA, read from the
148 specified file a password to supply for the user whose name is
149 specified with the -u option, or whose DN is specified with the
150 -U option. This is typically only required when the enrollment
151 profile being used uses UidPwdDirAuth-based, UserPwdDirAuth-
152 based, or NISAuth-based authentication. If the URL specified
153 using the -E flag is not an HTTPS URL, this value will not be
154 encrypted.
155
156 -Y userpin
157 When initially submitting a request to the CA, supply the speci‐
158 fied value as the PIN for the user whose name is specified with
159 the -u option, or whose DN is specified with the -U option.
160 This is typically only required when the enrollment profile
161 being used uses UidPwdPinDirAuth-based authentication. If the
162 URL specified using the -E flag is not an HTTPS URL, this value
163 will not be encrypted.
164
165 -y userpinfile
166 When initially submitting a request to the CA, read from the
167 specified file a PIN to supply for the user whose name is speci‐
168 fied with the -u option, or whose DN is specified with the -U
169 option. This is typically only required when the enrollment
170 profile being used uses UidPwdPinDirAuth-based authentication.
171 If the URL specified using the -E flag is not an HTTPS URL, this
172 value will not be encrypted.
173
174 -v Increases the logging level. Use twice for more logging. This
175 option is mainly useful for troubleshooting.
176
177
179 0 if the certificate was issued. The certificate will be printed.
180
181 1 if the CA is still thinking. A cookie (state) value will be
182 printed.
183
184 2 if the CA rejected the request. An error message may be
185 printed.
186
187 3 if the CA was unreachable. An error message may be printed.
188
189 4 if critical configuration information is missing. An error mes‐
190 sage may be printed.
191
192 5 if the CA is still thinking. A suggested poll delay (specified
193 in seconds) and a cookie (state) value will be printed.
194
195 17 if the CA indicates that the client needs to attempt enrollment
196 using a new key pair.
197
198
200 Please file tickets for any that you find at https://fedora‐
201 hosted.org/certmonger/
202
203
205 certmonger(8) getcert(1) getcert-add-ca(1) getcert-add-scep-ca(1)
206 getcert-list-cas(1) getcert-list(1) getcert-modify-ca(1) getcert-
207 refresh-ca(1) getcert-remove-ca(1) getcert-resubmit(1) getcert-start-
208 tracking(1) getcert-status(1) getcert-stop-tracking(1) certmonger-cert‐
209 master-submit(8) certmonger-dogtag-ipa-renew-agent-submit(8) certmon‐
210 ger-ipa-submit(8) certmonger-local-submit(8) certmonger-scep-submit(8)
211 certmonger_selinux(8)
212
213
214
215certmonger Manual 13 Apr 2015 certmonger(8)