From d06a571b5b0a3e079ee3bcc1927bacae474ce200 Mon Sep 17 00:00:00 2001 From: Endi Sukma Dewata Date: Tue, 20 Mar 2012 19:42:14 -0500 Subject: Added cloning and certificate scripts. --- scripts/ca-configure.sh | 24 +++++++++++++----------- 1 file changed, 13 insertions(+), 11 deletions(-) (limited to 'scripts/ca-configure.sh') diff --git a/scripts/ca-configure.sh b/scripts/ca-configure.sh index 892a94c..bbdf33c 100755 --- a/scripts/ca-configure.sh +++ b/scripts/ca-configure.sh @@ -2,26 +2,28 @@ PKI_DEV_SRC=`cd .. ; pwd` +INSTANCE_NAME=pki-ca PASSWORD=Secret123 -PIN=`grep preop.pin= /var/lib/pki-ca/conf/CS.cfg | awk -F= '{ print $2; }'` +PIN=`grep preop.pin= /var/lib/$INSTANCE_NAME/conf/CS.cfg | awk -F= '{ print $2; }'` +REALM=EXAMPLE-COM CERTS=$PKI_DEV_SRC/certs/ca rm -rf $CERTS mkdir -p $CERTS pkisilent ConfigureCA \ - -cs_hostname `hostname` \ + -cs_hostname $HOSTNAME \ -cs_port 9443 \ -preop_pin $PIN \ -client_certdb_dir "$CERTS" \ -client_certdb_pwd "$PASSWORD" \ -token_name "internal" \ - -domain_name "Example Domain" \ + -domain_name "$REALM" \ -subsystem_name "Certificate Authority" \ -ldap_host "localhost" \ -ldap_port "389" \ -base_dn "ou=ca,dc=example,dc=com" \ - -db_name "example.com-pki-ca" \ + -db_name "example.com-$INSTANCE_NAME" \ -bind_dn "cn=Directory Manager" \ -bind_password "$PASSWORD" \ -remove_data true \ @@ -32,20 +34,20 @@ pkisilent ConfigureCA \ -save_p12 true \ -backup_fname "$CERTS/ca-server-certs.p12" \ -backup_pwd "$PASSWORD" \ - -ca_sign_cert_subject_name "CN=Certificate Authority,OU=pki-ca,O=Example Domain" \ - -ca_ocsp_cert_subject_name "CN=OCSP Signing Certificate,OU=pki-ca,O=Example Domain" \ - -ca_server_cert_subject_name "CN=$HOSTNAME,OU=pki-ca,O=Example Domain" \ - -ca_subsystem_cert_subject_name "CN=CA Subsystem Certificate,OU=pki-ca,O=Example Domain" \ - -ca_audit_signing_cert_subject_name "CN=CA Audit Signing Certificate,OU=pki-ca,O=Example Domain" \ + -ca_sign_cert_subject_name "CN=Certificate Authority,O=$REALM" \ + -ca_ocsp_cert_subject_name "CN=OCSP Signing Certificate,O=$REALM" \ + -ca_server_cert_subject_name "CN=$HOSTNAME,O=$REALM" \ + -ca_subsystem_cert_subject_name "CN=CA Subsystem Certificate,O=$REALM" \ + -ca_audit_signing_cert_subject_name "CN=CA Audit Signing Certificate,O=$REALM" \ -admin_user "caadmin" \ -agent_name "caadmin" \ -admin_email "caadmin@example.com" \ -admin_password "$PASSWORD" \ -agent_key_size 2048 \ -agent_key_type rsa \ - -agent_cert_subject "CN=caadmin,UID=caadmin,E=caadmin@example.com,O=Example Domain" + -agent_cert_subject "CN=caadmin,UID=caadmin,E=caadmin@example.com,O=$REALM" echo $PASSWORD > "$CERTS/password.txt" PKCS12Export -d "$CERTS" -o "$CERTS/ca-client-certs.p12" -p "$CERTS/password.txt" -w "$CERTS/password.txt" -systemctl restart pki-cad@pki-ca.service +systemctl restart pki-cad@$INSTANCE_NAME.service -- cgit