diff options
author | Ade Lee <alee@redhat.com> | 2012-12-18 21:29:11 -0500 |
---|---|---|
committer | Ade Lee <alee@redhat.com> | 2012-12-19 00:07:30 -0500 |
commit | 87af59c01bf14c4c5f9765cce7b52d17f62583ae (patch) | |
tree | 82c684e4979dc0e08b4b534dce18645676d8471d /base/deploy | |
parent | 62033f12b40e6eb3270c352e966a7461f152dfd6 (diff) | |
download | pki-87af59c01bf14c4c5f9765cce7b52d17f62583ae.tar.gz pki-87af59c01bf14c4c5f9765cce7b52d17f62583ae.tar.xz pki-87af59c01bf14c4c5f9765cce7b52d17f62583ae.zip |
Man page addition for parameter pki_client_admin_cert_p12
Diffstat (limited to 'base/deploy')
-rw-r--r-- | base/deploy/man/man5/pki_default.cfg.5 | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/base/deploy/man/man5/pki_default.cfg.5 b/base/deploy/man/man5/pki_default.cfg.5 index a89f0895d..e31002e1b 100644 --- a/base/deploy/man/man5/pki_default.cfg.5 +++ b/base/deploy/man/man5/pki_default.cfg.5 @@ -130,6 +130,10 @@ Set to True to import an existing admin certificate for the admin user, rather t By default, this is set to False for CA subsystems and true for KRA, OCSP, and TKS subsystems. In this case, the admin certificate is read from the file ca_admin.cert in \fBpki_client_dir\fP. Note that cloned subsystems do not create a new administrative user. The administrative user of the master subsystem is used instead, and the details of this master user are replicated during the install. +.TP +.B pki_client_admin_cert_p12 +.IP +Location for the PKCS #12 file containing the administrative user's certificate and keys. For a CA, this defaults to \fIca_admin_cert.p12\fP in the \fBpki_client_dir\fP directory. .SS BACKUP PARAMETERS .TP .B pki_backup_keys, pki_backup_password |