1certmonger(1)               General Commands Manual              certmonger(1)
2
3
4

NAME

6       getcert
7
8

SYNOPSIS

10       getcert start-tracking [options]
11
12

DESCRIPTION

14       Tells certmonger to monitor an already-issued certificate.  Optionally,
15       when the certificate nears expiration, use an existing key pair (or  to
16       generate one if one is not already found in the specified location), to
17       generate a signing request using the key pair and to  submit  them  for
18       signing to a CA.
19
20

SPECIFYING EXISTING REQUESTS

22       -i NAME
23              Modify  the  request which has this nickname.  If this option is
24              not specified, and a tracking entry which matches  the  key  and
25              certificate  storage options which are specified already exists,
26              that entry will be modified.  Otherwise, a  new  tracking  entry
27              will be added.
28
29

KEY AND CERTIFICATE STORAGE OPTIONS

31       -d DIR Use  an NSS database in the specified directory for reading this
32              certificate and, if possible, the corresponding key.
33
34       -n NAME
35              Use the certificate with this nickname, and  if  a  private  key
36              with  the  same nickname or which corresponds to the certificate
37              is available, to use it, too.  Only valid with -d.
38
39       -t TOKEN
40              If the NSS database has more than one token available,  use  the
41              token  with  this  name  for  accessing the certificate and key.
42              This argument only rarely needs to  be  specified.   Only  valid
43              with -d.
44
45       -f FILE
46              Read  the certificate from this file.  For safety's sake, do not
47              use the same file specified with the -k option.
48
49       -k FILE
50              Use the key stored in this file to generate  a  signing  request
51              for  refreshing  the certificate.  If no such file is found when
52              needed, generate a new key pair and  store  them  in  the  file.
53              Only valid with -f.
54
55

KEY ENCRYPTION OPTIONS

57       -p FILE
58              The  private  key files or databases are encrypted using the PIN
59              stored in the named file as the passphrase.
60
61       -P PIN The private key files or databases are encrypted using the spec‐
62              ified  PIN as the passphrase.  Because command-line arguments to
63              running processes are trivially discoverable, use of this option
64              is not recommended except for testing.
65
66

TRACKING OPTIONS

68       -I NAME
69              Assign  the  specified nickname to this task.  If this option is
70              not specified, a name will  be  assigned  automatically.   Valid
71              nicknames   contain  only  characters  from  the  set  "[A-Z][a-
72              z][0-9]_".
73
74       -r     Attempt to obtain a new certificate from the CA when the expira‐
75              tion date of a certificate nears.  This is the default setting.
76
77       -R     Don't  attempt  to obtain a new certificate from the CA when the
78              expiration date of a certificate nears.  If this option is spec‐
79              ified, an expired certificate will simply stay expired.
80
81

ENROLLMENT OPTIONS

83       -c NAME
84              Enroll  with  the  specified  CA rather than a possible default.
85              The name of the CA should correspond to one  listed  by  getcert
86              list-cas.  Only useful in combination with -r.
87
88

SIGNING REQUEST OPTIONS

90       If  and when certmonger attempts to obtain a new certificate to replace
91       the one being monitored, the values to be added to the signing  request
92       will be taken from the current certificate, unless preferred values are
93       set using one or more of -U, -K, -E, and -D.
94
95
96       -U EKU Add an extensionRequest for the  specified  extendedKeyUsage  to
97              the  signing request.  The EKU value is expected to be an object
98              identifier (OID).
99
100       -K NAME
101              Add an extensionRequest for a subjectAltName, with the specified
102              Kerberos principal name as its value, to the signing request.
103
104       -E EMAIL
105              Add an extensionRequest for a subjectAltName, with the specified
106              email address as its value, to the signing request.
107
108       -D DNSNAME
109              Add an extensionRequest for a subjectAltName, with the specified
110              DNS name as its value, to the signing request.
111
112

OTHER OPTIONS

114       -v     Be  verbose  about  errors.   Normally,  the details of an error
115              received from the daemon will be suppressed if  the  client  can
116              make a diagnostic suggestion.
117
118

BUGS

120       Please   file   tickets  for  any  that  you  find  at  https://fedora
121       hosted.org/certmonger/
122
123

SEE ALSO

125       certmonger(8) getcert(1) getcert-list(1)  getcert-list-cas(1)  getcert-
126       request(1)   getcert-resubmit(1)  getcert-stop-tracking(1)  certmonger-
127       certmaster-submit(8) certmonger-ipa-submit(8)
128
129
130
131certmonger Manual               12 August 2010                   certmonger(1)
Impressum