1CERTMONGER(1) General Commands Manual CERTMONGER(1)
2
3
4
6 getcert
7
8
10 getcert rekey [options]
11
12
14 Tells certmonger to generate a new key pair, generate a signing request
15 for the public key, and submit the signing request to a CA for signing,
16 in order to replace both a certificate and its private key.
17
18
20 -i NAME, --id=NAME
21 The new key pair will be generated and the new certificate will
22 be obtained for the tracking request which has this nickname.
23 If this option is not specified, and a tracking entry which
24 matches the key and certificate storage options which are speci‐
25 fied already exists, that entry will be used. If not specified,
26 the location of the certificate should be specified with either
27 a combination of the -d and -n options, or with the -f option.
28
29
31 -d DIR, --dbdir=DIR
32 The certificate is in the NSS database in the specified direc‐
33 tory.
34
35 -n NAME, --nickname=NAME
36 The certificate in the NSS database named with -d has the speci‐
37 fied nickname. Only valid with -d.
38
39 -t TOKEN, --token=TOKEN
40 If the NSS database has more than one token available, the cer‐
41 tificate is stored in this token. This argument only rarely
42 needs to be specified. Only valid with -d.
43
44 -f FILE, --certfile=FILE
45 The certificate is stored in the named file.
46
47
49 -G TYPE, --key-type=TYPE
50 In case a new key pair needs to be generated, this option speci‐
51 fies the type of the keys to be generated. If not specified,
52 the current key type will be used.
53
54 -g BITS, --key-size=BITS
55 This option specifies the size of the new key to be generated.
56 If not specified, a key of the same size as the existing key
57 will be generated.
58
59
61 -c NAME, --ca=NAME
62 Submit the new signing request to the specified CA rather than
63 the one which was previously associated with this certificate.
64 The name of the CA should correspond to one listed by getcert
65 list-cas.
66
67 -T NAME, --profile=NAME
68 Request a certificate using the named profile, template, or
69 certtype, from the specified CA.
70
71 --ms-template-spec SPEC
72 Include a V2 Certificate Template extension in the signing
73 request. This datum includes an Object Identifier, a major ver‐
74 sion number (positive integer) and an optional minor version
75 number. The format is: <oid>:<majorVersion>[:<minorVersion>].
76
77 -X NAME, --issuer=NAME
78 Request a certificate using the named issuer from the specified
79 CA.
80
81 -I NAME, --new-id=NAME
82 Assign the specified nickname to this task, replacing the previ‐
83 ous nickname.
84
85
87 -N NAME, --subject-name=NAME
88 Change the subject name to include in the signing request.
89
90 -u keyUsage, --key-usage=keyUsage
91 Add an extensionRequest for the specified keyUsage to the sign‐
92 ing request. The keyUsage value is expected to be one of these
93 names:
94
95 digitalSignature
96
97 nonRepudiation
98
99 keyEncipherment
100
101 dataEncipherment
102
103 keyAgreement
104
105 keyCertSign
106
107 cRLSign
108
109 encipherOnly
110
111 decipherOnly
112
113 -U EKU, --extended-key-usage=EKU
114 Change the extendedKeyUsage value specified in an extended‐
115 KeyUsage extension part of the extensionRequest attribute in the
116 signing request. The EKU value is expected to be an object
117 identifier (OID).
118
119 -K NAME, --ca=NAME
120 Change the Kerberos principal name specified as part of a sub‐
121 jectAltName extension part of the extensionRequest attribute in
122 the signing request.
123
124 -E EMAIL, --email=EMAIL
125 Change the email address specified as part of a subjectAltName
126 extension part of the extensionRequest attribute in the signing
127 request.
128
129 -D DNSNAME, --dns=DNSNAME
130 Change the DNS name specified as part of a subjectAltName exten‐
131 sion part of the extensionRequest attribute in the signing
132 request.
133
134 -A ADDRESS, --ip-address=ADDRESS
135 Change the IP address specified as part of a subjectAltName
136 extension part of the extensionRequest attribute in the signing
137 request.
138
139 -l FILE, --challenge-password-file=NAME
140 Add an optional ChallengePassword value, read from the file, to
141 the signing request. A ChallengePassword is often required when
142 the CA is accessed using SCEP.
143
144 -L PIN, --challenge-password=PIN
145 Add the argument value to the signing request as a Chal‐
146 lengePassword attribute. A ChallengePassword is often required
147 when the CA is accessed using SCEP.
148
149
151 -B COMMAND, --before-command=COMMAND
152 When ever the certificate or the CA's certificates are saved to
153 the specified locations, run the specified command as the client
154 user before saving the certificates.
155
156 -C COMMAND, --after-command=COMMAND
157 When ever the certificate or the CA's certificates are saved to
158 the specified locations, run the specified command as the client
159 user after saving the certificates.
160
161 -a DIR, --ca-dbdir=DIR
162 When ever the certificate is saved to the specified location, if
163 root certificates for the CA are available, save them to the
164 specified NSS database.
165
166 -F FILE, --ca-file=FILE
167 When ever the certificate is saved to the specified location, if
168 root certificates for the CA are available, and when the local
169 copies of the CA's root certificates are updated, save them to
170 the specified file.
171
172 --for-ca
173 Request a CA certificate.
174
175 --not-for-ca
176 Request a non-CA certificate (the default).
177
178 --ca-path-length=LENGTH
179 Path length for CA certificate. Only valid with --for-ca.
180
181 -w, --wait
182 Wait for the new certificate to be issued and saved, or for the
183 attempt to obtain one using the new key to fail.
184
185 --wait-timeout=TIMEOUT
186 Maximum time to wait for the certificate to be issued.
187
188 -v --verbose
189 Be verbose about errors. Normally, the details of an error
190 received from the daemon will be suppressed if the client can
191 make a diagnostic suggestion.
192
193
195 Please file tickets for any that you find at https://fedora‐
196 hosted.org/certmonger/
197
198
200 certmonger(8) getcert(1) getcert-add-ca(1) getcert-add-scep-ca(1)
201 getcert-list-cas(1) getcert-list(1) getcert-modify-ca(1)
202 getcert-refresh-ca(1) getcert-refresh(1) getcert-remove-ca(1)
203 getcert-request(1) getcert-start-tracking(1) getcert-status(1)
204 getcert-stop-tracking(1) certmonger-certmaster-submit(8) certmon‐
205 ger-dogtag-ipa-renew-agent-submit(8) certmonger-dogtag-submit(8) cert‐
206 monger-ipa-submit(8) certmonger-local-submit(8) certmonger-scep-sub‐
207 mit(8) certmonger_selinux(8)
208
209
210
211certmonger Manual July 31, 2015 CERTMONGER(1)