1ipa-cacert-manage(1)           IPA Manual Pages           ipa-cacert-manage(1)
2
3
4

NAME

6       ipa-cacert-manage - Manage CA certificates in IPA
7

SYNOPSIS

9       ipa-cacert-manage [OPTIONS...] renew
10       ipa-cacert-manage [OPTIONS...] install CERTFILE...
11       ipa-cacert-manage [OPTIONS...] delete NICKNAME
12       ipa-cacert-manage [OPTIONS...] list
13       ipa-cacert-manage [OPTIONS...] prune
14

DESCRIPTION

16       ipa-cacert-manage can be used to manage CA certificates in IPA.
17

COMMANDS

19       renew  - Renew the IPA CA certificate
20
21              This command can be used to manually renew the CA certificate of
22              the IPA CA (NSS database nickname: "caSigningCert cert-pki-ca").
23              To renew other certificates, use getcert-resubmit(1).
24
25              When  the IPA CA is the root CA (the default), it is not usually
26              necessary to manually renew the CA certificate, as  it  will  be
27              renewed automatically when it is about to expire, but you can do
28              so if you wish.
29
30              When the IPA CA is subordinate of an external  CA,  the  renewal
31              process  involves  submitting  a  CSR to the external CA and in‐
32              stalling the newly issued certificate in IPA,  which  cannot  be
33              done  automatically.  It  is  necessary to manually renew the CA
34              certificate in this setup.
35
36              When the IPA CA is not configured, this command  is  not  avail‐
37              able.
38
39       install
40              - Install one or more CA certificates
41
42              This  command  can be used to install the certificates contained
43              in CERTFILE as additional CA certificates to IPA.
44
45              Important: this does not replace IPA CA but  adds  the  provided
46              certificate  as a known CA. This is useful for instance when us‐
47              ing ipa-server-certinstall  to  replace  HTTP/LDAP  certificates
48              with third-party certificates signed by this additional CA.
49
50              Please  do  not  forget to run ipa-certupdate on the master, all
51              the replicas and all the clients after this command in order  to
52              update IPA certificates databases.
53
54              The supported formats for the certificate files are DER, PEM and
55              PKCS#7 format.
56
57       delete - Remove a CA certificate
58
59              Remove a CA from IPA. The nickname of a CA to be removed can  be
60              found  using  the list command. The CA chain is validated before
61              allowing a CA to be removed so leaf certificates in a chain need
62              to be removed first.
63
64              Please  do  not  forget to run ipa-certupdate on the master, all
65              the replicas and all the clients after this command in order  to
66              update IPA certificates databases.
67
68       list   - List the stored CA certificates
69
70              Display  a  list of the nicknames or subjects of the CA certifi‐
71              cates that have been installed.
72
73       prune  - Prune the stored CA certificates
74
75              Removes installed CA certificates that are expired.
76

COMMON OPTIONS

78       --version
79              Show the program's version and exit.
80
81       -h, --help
82              Show the help for this program.
83
84       -p DM_PASSWORD, --password=DM_PASSWORD
85              The Directory Manager password to use for authentication.
86
87       -v, --verbose
88              Print debugging information.
89
90       -q, --quiet
91              Output only errors.
92
93       --log-file=FILE
94              Log to the given file.
95

RENEW OPTIONS

97       --self-signed
98              Sign the renewed certificate by itself.
99
100       --external-ca
101              Sign the renewed certificate by external CA.
102
103       --external-ca-type=TYPE
104              Type of the external CA. Possible values are "generic", "ms-cs".
105              Default  value is "generic". Use "ms-cs" to include the template
106              name required by Microsoft Certificate Services (MS CS)  in  the
107              generated CSR (see --external-ca-profile for full details).
108
109
110       --external-ca-profile=PROFILE_SPEC
111              Specify the certificate profile or template to use at the exter‐
112              nal CA.
113
114              When --external-ca-type is "ms-cs" the following specifiers  may
115              be used:
116
117
118              <oid>:<majorVersion>[:<minorVersion>]
119                     Specify  a certificate template by OID and major version,
120                     optionally also specifying minor version.
121
122              <name> Specify a certificate template by name.  The name  cannot
123                     contain  any : characters and cannot be an OID (otherwise
124                     the OID-based  template  specifier  syntax  takes  prece‐
125                     dence).
126
127              default
128                     If no template is specified, the template name "SubCA" is
129                     used.
130
131
132       --external-cert-file=FILE
133              File containing the IPA CA certificate and the external CA  cer‐
134              tificate  chain. The file is accepted in PEM and DER certificate
135              and PKCS#7 certificate chain formats. This option  may  be  used
136              multiple times.
137

INSTALL OPTIONS

139       -n NICKNAME, --nickname=NICKNAME
140              Nickname for the certificate. Applicable only when a single cer‐
141              tificate is being installed.
142
143       -t TRUST_FLAGS, --trust-flags=TRUST_FLAGS
144              Trust flags for the certificate in certutil format. Trust  flags
145              are  of  the  form "A,B,C" or "A,B,C,D" where A is for SSL, B is
146              for S/MIME, C is for code signing, and D is for PKINIT. Use ",,"
147              for no explicit trust.
148
149              The supported trust flags are:
150
151                     C - CA trusted to issue server certificates
152
153                     T - CA trusted to issue client certificates
154
155                     p - not trusted
156

DELETE OPTIONS

158       -f, --force
159              Force  a  CA  certificate to be removed even if chain validation
160              fails.
161

EXIT STATUS

163       0 if the command was successful
164
165       1 if an error occurred
166
167

SEE ALSO

169       getcert-resubmit(1)
170
171
172
173IPA                               Aug 12 2013             ipa-cacert-manage(1)
Impressum