summaryrefslogtreecommitdiffstats
path: root/scripts/ca-configure.sh
diff options
context:
space:
mode:
authorEndi Sukma Dewata <edewata@redhat.com>2012-03-08 03:10:49 -0600
committerEndi Sukma Dewata <edewata@redhat.com>2012-03-16 10:47:39 -0500
commit0bfd291051117ea6af3c2637a764a8f56626f555 (patch)
treef7f904bd9ec4fcb0d952b3ff54017d3a3fa03442 /scripts/ca-configure.sh
downloadpki-dev-0bfd291051117ea6af3c2637a764a8f56626f555.tar.gz
pki-dev-0bfd291051117ea6af3c2637a764a8f56626f555.tar.xz
pki-dev-0bfd291051117ea6af3c2637a764a8f56626f555.zip
Initial check-in.
Diffstat (limited to 'scripts/ca-configure.sh')
-rwxr-xr-xscripts/ca-configure.sh51
1 files changed, 51 insertions, 0 deletions
diff --git a/scripts/ca-configure.sh b/scripts/ca-configure.sh
new file mode 100755
index 0000000..892a94c
--- /dev/null
+++ b/scripts/ca-configure.sh
@@ -0,0 +1,51 @@
+#!/bin/sh -x
+
+PKI_DEV_SRC=`cd .. ; pwd`
+
+PASSWORD=Secret123
+PIN=`grep preop.pin= /var/lib/pki-ca/conf/CS.cfg | awk -F= '{ print $2; }'`
+
+CERTS=$PKI_DEV_SRC/certs/ca
+rm -rf $CERTS
+mkdir -p $CERTS
+
+pkisilent ConfigureCA \
+ -cs_hostname `hostname` \
+ -cs_port 9443 \
+ -preop_pin $PIN \
+ -client_certdb_dir "$CERTS" \
+ -client_certdb_pwd "$PASSWORD" \
+ -token_name "internal" \
+ -domain_name "Example Domain" \
+ -subsystem_name "Certificate Authority" \
+ -ldap_host "localhost" \
+ -ldap_port "389" \
+ -base_dn "ou=ca,dc=example,dc=com" \
+ -db_name "example.com-pki-ca" \
+ -bind_dn "cn=Directory Manager" \
+ -bind_password "$PASSWORD" \
+ -remove_data true \
+ -key_type rsa \
+ -key_size 2048 \
+ -key_algorithm SHA256withRSA \
+ -signing_signingalgorithm SHA256withRSA \
+ -save_p12 true \
+ -backup_fname "$CERTS/ca-server-certs.p12" \
+ -backup_pwd "$PASSWORD" \
+ -ca_sign_cert_subject_name "CN=Certificate Authority,OU=pki-ca,O=Example Domain" \
+ -ca_ocsp_cert_subject_name "CN=OCSP Signing Certificate,OU=pki-ca,O=Example Domain" \
+ -ca_server_cert_subject_name "CN=$HOSTNAME,OU=pki-ca,O=Example Domain" \
+ -ca_subsystem_cert_subject_name "CN=CA Subsystem Certificate,OU=pki-ca,O=Example Domain" \
+ -ca_audit_signing_cert_subject_name "CN=CA Audit Signing Certificate,OU=pki-ca,O=Example Domain" \
+ -admin_user "caadmin" \
+ -agent_name "caadmin" \
+ -admin_email "caadmin@example.com" \
+ -admin_password "$PASSWORD" \
+ -agent_key_size 2048 \
+ -agent_key_type rsa \
+ -agent_cert_subject "CN=caadmin,UID=caadmin,E=caadmin@example.com,O=Example Domain"
+
+echo $PASSWORD > "$CERTS/password.txt"
+PKCS12Export -d "$CERTS" -o "$CERTS/ca-client-certs.p12" -p "$CERTS/password.txt" -w "$CERTS/password.txt"
+
+systemctl restart pki-cad@pki-ca.service