diff options
| author | Matthew Harmsen <mharmsen@redhat.com> | 2016-08-19 16:08:56 -0600 |
|---|---|---|
| committer | Matthew Harmsen <mharmsen@redhat.com> | 2016-08-19 16:08:56 -0600 |
| commit | fb8cff8cef10580ff5c14c5d5df535613779f9c5 (patch) | |
| tree | a22e964bd635b0b24384de222004f6749c421705 /base/java-tools/man | |
| parent | 534633885ae28db230786c25374fba66120ed933 (diff) | |
| download | pki-fb8cff8cef10580ff5c14c5d5df535613779f9c5.tar.gz pki-fb8cff8cef10580ff5c14c5d5df535613779f9c5.tar.xz pki-fb8cff8cef10580ff5c14c5d5df535613779f9c5.zip | |
pki-tools CMCEnroll man page
* PKI TRAC Ticket #690 - [MAN] pki-tools man pages
- CMCEnroll
Diffstat (limited to 'base/java-tools/man')
| -rw-r--r-- | base/java-tools/man/man1/CMCEnroll.1 | 570 |
1 files changed, 570 insertions, 0 deletions
diff --git a/base/java-tools/man/man1/CMCEnroll.1 b/base/java-tools/man/man1/CMCEnroll.1 new file mode 100644 index 000000000..4cc861f51 --- /dev/null +++ b/base/java-tools/man/man1/CMCEnroll.1 @@ -0,0 +1,570 @@ +.\" First parameter, NAME, should be all caps +.\" Second parameter, SECTION, should be 1-8, maybe w/ subsection +.\" other parameters are allowed: see man(7), man(1) +.TH CMCEnroll 1 "July 20, 2016" "version 10.3" "PKI CMC Enrollment Tool" Dogtag Team +.\" Please adjust this date whenever revising the man page. +.\" +.\" Some roff macros, for reference: +.\" .nh disable hyphenation +.\" .hy enable hyphenation +.\" .ad l left justify +.\" .ad b justify to both left and right margins +.\" .nf disable filling +.\" .fi enable filling +.\" .br insert line break +.\" .sp <n> insert n+1 empty lines +.\" for man page specific macros, see man(7) +.SH NAME +CMCEnroll \- Used to sign a certificate request with an agent's certificate. + +.SH SYNOPSIS +.PP +\fBCMCEnroll -d <directory_of_NSS_security_database_containing_agent_cert> -n <certificate_nickname> -r <certificate_request_file> -p <certificate_DB_passwd>\fP + +.SH DESCRIPTION +.PP +The Certificate Management over Cryptographic Message Syntax (CMC) Enrollment utility, \fBCMCEnroll\fP, provides a command-line utility used to sign a certificate request with an agent's certificate. This can be used in conjunction with the CA end-entity CMC Enrollment form to sign and enroll certificates for users. +.PP +\fBCMCEnroll\fP takes a standard PKCS #10 certificate request and signs it with an agent certificate. The output is also a certificate request which can be submitted through the appropriate profile. + +.SH OPTIONS +.PP +The following parameters are mandatory: +.PP +\fBNote:\fP +Surround values that include spaces with quotation marks. +.TP +.B -d <directory_of_NSS_security_database_containing_agent_cert> +The directory containing the \fBcert8.db\fP, \fBkey3.db\fP, and \fBsecmod.db\fP files associated with the agent certificate. This is usually the agent's personal directory, such as their browser certificate database in the home directory. + +.TP +.B -n <certificate_nickname> +The nickname of the agent certificate that is used to sign the request. + +.TP +.B -r <certificate_request_file> +The filename of the certificate request. + +.TP +.B -p <certificate_DB_passwd> +The password to the NSS certificate database which contains the agent certificate, given in \fB-d <directory_of_NSS_security_database_containing_agent_cert>\fP. + +.SH EXAMPLES +.PP +Signed requests must be submitted to the CA to be processed. +.PP +\fBNote:\fP For this example to work automatically, the \fBCMCAuth\fP plug-in must be enabled on the CA server (which it is by default). +.TP +(1) Create a PKCS #10 certificate request using a tool like \fBcertutil\fP: +.IP +.nf +# cd ~/.mozilla/firefox/<browser profile> + +# certutil -d . -L +Certificate Nickname Trust Attributes + SSL,S/MIME,JAR/XPI + +Google Internet Authority G2 ,, +COMODO RSA Domain Validation Secure Server CA ,, +pki.example.com ,, +DigiCert SHA2 Secure Server CA ,, +DigiCert SHA2 Extended Validation Server CA ,, +COMODO RSA Extended Validation Secure Server CA 2 ,, +Symantec Class 3 Secure Server CA - G4 ,, +Go Daddy Secure Certificate Authority - G2 ,, +Oracle SSL CA - G2 ,, +GeoTrust EV SSL CA - G4 ,, +Symantec Class 3 Secure Server SHA256 SSL CA ,, +GeoTrust SSL CA - G3 ,, +PKI Administrator for example.com u,u,u +DigiCert SHA2 High Assurance Server CA ,, +COMODO RSA Organization Validation Secure Server CA ,, +CA Signing Certificate - example.com Security Domain CT,C,C + +# certutil -d . -R -s "CN=CMCEnroll Test Certificate" -a + +A random seed must be generated that will be used in the +creation of your key. One of the easiest ways to create a +random seed is to use the timing of keystrokes on a keyboard. + +To begin, type keys on the keyboard until this progress meter +is full. DO NOT USE THE AUTOREPEAT FUNCTION ON YOUR KEYBOARD! + + +Continue typing until the progress meter is full: + +|************************************************************| + +Finished. Press enter to continue: + + +Generating key. This may take a few moments... + + +Certificate request generated by Netscape certutil +Phone: (not specified) + +Common Name: CMCEnroll Test Certificate +Email: (not specified) +Organization: (not specified) +State: (not specified) +Country: (not specified) + +-----BEGIN CERTIFICATE REQUEST----- +MIICajCCAVICAQAwJTEjMCEGA1UEAxMaQ01DRW5yb2xsIFRlc3QgQ2VydGlmaWNh +dGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDamQA6psK7Tnic3DAt +IyAMCk7FK3PuSseJSrR/C7W05tPvrlp5vUKxpmcA+Pg3AANp5gVMQOps6riAvoK7 +6NKTkw4Me09Cowad7ay9IBBY4QqqBmRnfT3Mm6U5tJWeqvq1cIkwoxzHllgsGBGM +QduI7URjhQYx3p+srGSe0fM7bqK+AU6aJh4r0jc1A6pCv/2XMOY1IUzmjIEnNq2R +WOpnsWQ4UDma1r8sUzKgNhkuhjPU5U5YGt9+0jiuqv14dbKi7UJN3DPtkEXZNOrF +rGgqKhdUqLhrdm+x/Hgw/aZoSDFYXON9jFTFyMUyUkWXZq5sfwghWUC2q4DsbfvH +68h1AgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEAQ9aHQvPDcDuOJOL62pQeoDJp +YtFmsDaksdhedG27usjPuX06XmzSIV3/D2zfPib2fpfdrHB5901TdehlghQVOkN6 +sSoih60GSD9zCkFD1eESywJJeZssRfDG4gk2Ls9wXz5ZY/QwSx6C97SodF0cuDHL +FsymesuxhePL7sYkkmazjgQTkA/JXLe6FYX213xQ+FGfQvmAqc9xHu5jvnBXX+Ub +ucixaLKUiRIVHfTmuUb/qenEBQM2vzWDZawHL5SBSa/Zxjy2iVMrQBeOiLcu8bTL +TAmSCbonRTilFrKFVG0H+Y9+5bulOdJc64XOvj9DRJd1FJoocw0eGhw31I5rJA== +-----END CERTIFICATE REQUEST----- +.if + +.TP +(2) Copy the PKCS #10 ASCII output to a text file. +.IP +.nf +# vi cert.req +-----BEGIN CERTIFICATE REQUEST----- +MIICajCCAVICAQAwJTEjMCEGA1UEAxMaQ01DRW5yb2xsIFRlc3QgQ2VydGlmaWNh +dGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDamQA6psK7Tnic3DAt +IyAMCk7FK3PuSseJSrR/C7W05tPvrlp5vUKxpmcA+Pg3AANp5gVMQOps6riAvoK7 +6NKTkw4Me09Cowad7ay9IBBY4QqqBmRnfT3Mm6U5tJWeqvq1cIkwoxzHllgsGBGM +QduI7URjhQYx3p+srGSe0fM7bqK+AU6aJh4r0jc1A6pCv/2XMOY1IUzmjIEnNq2R +WOpnsWQ4UDma1r8sUzKgNhkuhjPU5U5YGt9+0jiuqv14dbKi7UJN3DPtkEXZNOrF +rGgqKhdUqLhrdm+x/Hgw/aZoSDFYXON9jFTFyMUyUkWXZq5sfwghWUC2q4DsbfvH +68h1AgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEAQ9aHQvPDcDuOJOL62pQeoDJp +YtFmsDaksdhedG27usjPuX06XmzSIV3/D2zfPib2fpfdrHB5901TdehlghQVOkN6 +sSoih60GSD9zCkFD1eESywJJeZssRfDG4gk2Ls9wXz5ZY/QwSx6C97SodF0cuDHL +FsymesuxhePL7sYkkmazjgQTkA/JXLe6FYX213xQ+FGfQvmAqc9xHu5jvnBXX+Ub +ucixaLKUiRIVHfTmuUb/qenEBQM2vzWDZawHL5SBSa/Zxjy2iVMrQBeOiLcu8bTL +TAmSCbonRTilFrKFVG0H+Y9+5bulOdJc64XOvj9DRJd1FJoocw0eGhw31I5rJA== +-----END CERTIFICATE REQUEST----- +.if + +.TP +(3) Run the \fBCMCEnroll\fP command to sign the certificate request. If the input file is "\fB~/.mozilla/firefox/<profile>/cert.req\fP", the agent's certificate is stored in the "\fB~/.mozilla/firefox\<profile>fP" directory, the certificate common name for this CA is "\fBPKI Administrator for example.com\fP", and the password for the certificate database is "\fBSecret123\fP", the command is as follows: +.IP +.nf +# CMCEnroll -d "~/.mozilla/firefox/<profile>/" -n "PKI Administrator for example.com" -r "~/.mozilla/firefox/<profile>/cert.req" -p "Secret123" +cert/key prefix = +path = ~/.mozilla/firefox/<profile>/ +-----BEGIN CERTIFICATE REQUEST----- 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-----END CERTIFICATE REQUEST----- +.if +The output of this command is stored in a file with the same filename as the request with a \fB.out\fP appended to the filename (e. g. - cert.req.out): +.IP +.nf +# cat cert.req.out +-----BEGIN CERTIFICATE REQUEST----- +MIIMhwYJKoZIhvcNAQcCoIIMeDCCDHQCAQMxCzAJBgUrDgMCGgUAMIIC6QYIKwYB +BQUHDAKgggLbBIIC1zCCAtMwVDAvAgECBggrBgEFBQcHBjEgBB5Da2UvQ1V6VEZF +Rzgwa1Ryb1dsNjVuTUZhMEU9DQowIQIBAwYIKwYBBQUHBwUxEgIQU05oqk+q+FdR +go/eIzsjGTCCAnWgggJxAgEBMIICajCCAVICAQAwJTEjMCEGA1UEAxMaQ01DRW5y +b2xsIFRlc3QgQ2VydGlmaWNhdGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK +AoIBAQDamQA6psK7Tnic3DAtIyAMCk7FK3PuSseJSrR/C7W05tPvrlp5vUKxpmcA ++Pg3AANp5gVMQOps6riAvoK76NKTkw4Me09Cowad7ay9IBBY4QqqBmRnfT3Mm6U5 +tJWeqvq1cIkwoxzHllgsGBGMQduI7URjhQYx3p+srGSe0fM7bqK+AU6aJh4r0jc1 +A6pCv/2XMOY1IUzmjIEnNq2RWOpnsWQ4UDma1r8sUzKgNhkuhjPU5U5YGt9+0jiu +qv14dbKi7UJN3DPtkEXZNOrFrGgqKhdUqLhrdm+x/Hgw/aZoSDFYXON9jFTFyMUy +UkWXZq5sfwghWUC2q4DsbfvH68h1AgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEA +Q9aHQvPDcDuOJOL62pQeoDJpYtFmsDaksdhedG27usjPuX06XmzSIV3/D2zfPib2 +fpfdrHB5901TdehlghQVOkN6sSoih60GSD9zCkFD1eESywJJeZssRfDG4gk2Ls9w +Xz5ZY/QwSx6C97SodF0cuDHLFsymesuxhePL7sYkkmazjgQTkA/JXLe6FYX213xQ ++FGfQvmAqc9xHu5jvnBXX+UbucixaLKUiRIVHfTmuUb/qenEBQM2vzWDZawHL5SB +Sa/Zxjy2iVMrQBeOiLcu8bTLTAmSCbonRTilFrKFVG0H+Y9+5bulOdJc64XOvj9D +RJd1FJoocw0eGhw31I5rJDAAMACggge1MIIDzDCCArSgAwIBAgIBATANBgkqhkiG +9w0BAQsFADBOMSswKQYDVQQKDCJ1c2Vyc3lzLnJlZGhhdC5jb20gU2VjdXJpdHkg +RG9tYWluMR8wHQYDVQQDDBZDQSBTaWduaW5nIENlcnRpZmljYXRlMB4XDTE2MDcy +MTIzNDAyNVoXDTM2MDcyMTIzNDAyNVowTjErMCkGA1UECgwidXNlcnN5cy5yZWRo +YXQuY29tIFNlY3VyaXR5IERvbWFpbjEfMB0GA1UEAwwWQ0EgU2lnbmluZyBDZXJ0 +aWZpY2F0ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKmWoikqOPpH +0JLW3SZ1SPojvndjdILqDuGuRmqtcLuzZtmNuY7ZVwrXt61G1SCCBoEiy/OcUCKM +GVpw0M15Dn3sjJmd9F2R5lrGT2eMWWfVTr15RyEwK9Pn0mxTDN+0eZ4WDY9U4Zg4 +2qZYIhkfGSTR5jhA4rs3uNOFm0ElLqDumGw3EXjJOy+RURvNbY4Pjlz89+Q2o6M0 +/XMmMYzxVtXusKu1bvTKIiWoWCXR5ge78GoT/8reer+zxuSXiKSeVV2myvCQhmMH +AD2rik/7hazuY2ztC8h9HF09PMSeK2ev6PlzSV/PEqj9u5bgOcbqeiQkzR6IOcSi +JCn9o7B+AUMCAwEAAaOBtDCBsTAfBgNVHSMEGDAWgBS7NphdZcuI4IcjN29b96+L +iuu6tTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBxjAdBgNVHQ4EFgQU +uzaYXWXLiOCHIzdvW/evi4rrurUwTgYIKwYBBQUHAQEEQjBAMD4GCCsGAQUFBzAB +hjJodHRwOi8vcGtpLWRlc2t0b3AudXNlcnN5cy5yZWRoYXQuY29tOjgwODAvY2Ev +b2NzcDANBgkqhkiG9w0BAQsFAAOCAQEANUYLK65kV0na9zmtNGFje4akz4FBRAOh +f/RYvtH4/0z38vW/E6fZkfb6CHrC4pNPfL6c0q/8H0mIrAft4kkQlTyJB9tdF5qY +vCfUMmZ+zM664U/97nf7NSUu9PIFcNfh+/O9IoVUd7gEerRISJzbsmHAcCcfIiKX +FsM+6HbEt+lH47flb/eSA2cUS84bC+XlZmKpse1R8PL/rKzngReZmMhNx73pYlEN +0qOpJILEMC1FVUExp6XnnP/m1+gY3T2FrIcUU7Jm1mCnln3VcLxkRU2c9tGj4xYr +H8teMoQHLZTiqe/54h+3/pUEDgSATAHnex/uG33TXNDbpeNeq720eDCCA+EwggLJ +oAMCAQICAQYwDQYJKoZIhvcNAQELBQAwTjErMCkGA1UECgwidXNlcnN5cy5yZWRo +YXQuY29tIFNlY3VyaXR5IERvbWFpbjEfMB0GA1UEAwwWQ0EgU2lnbmluZyBDZXJ0 +aWZpY2F0ZTAeFw0xNjA3MjEyMzQwMzBaFw0xODA3MTEyMzQwMzBaMHQxKzApBgNV +BAoMInVzZXJzeXMucmVkaGF0LmNvbSBTZWN1cml0eSBEb21haW4xKTAnBgkqhkiG +9w0BCQEWGmNhYWRtaW5AdXNlcnN5cy5yZWRoYXQuY29tMRowGAYDVQQDDBFQS0kg +QWRtaW5pc3RyYXRvcjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKPQ +fOUyTIkdDnPzBrFRBknHqjYMrRpUDBR+JlarT/Sr6PqNQPMcM7JvgBNmXG32H+5w +QH/sfVjOmKEJOMsh71vKiTM0wb5rIo08B34i9E5Cf2Wzx2/ht4qfWvSmb5ZBxy22 +YpasKLdv7SwSDQr0U7h+Q/96Hgq85ONxWWN6XubgZxSfbs7QVcA0jVq+2inhT67B +0u4DO6MTxFJNCfDcWiA/M6xzKbjEqDUEh46Rk19krGPYsbfW2BMuOi7pyfTDJVJ5 +CAUbo4bpR3eeo5KMbUvgF3WUxA1whOF2Oc6t0hdINW6Xeq3vpnwn3RyX2TRQ0zqi +n3K3uPdahteQNcRb/Q8CAwEAAaOBozCBoDAfBgNVHSMEGDAWgBS7NphdZcuI4Icj +N29b96+Liuu6tTBOBggrBgEFBQcBAQRCMEAwPgYIKwYBBQUHMAGGMmh0dHA6Ly9w +a2ktZGVza3RvcC51c2Vyc3lzLnJlZGhhdC5jb206ODA4MC9jYS9vY3NwMA4GA1Ud +DwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwQwDQYJKoZI +hvcNAQELBQADggEBAADJNrg4qAZ1LxSz2Nn1k1SEmbugxrh8o1jpBAaSvLlv+blL ++6wNq0D7c1GPzRO5TObyXgpbtHgofpKLSxw8cB3y8ugZMp7qJeCYxgzxQKEVMANW +6eZgAxvEe1J5Vyk/ELNiCtQmY7Mi+BtwvCF0xkCwYtOGlgeLV5t6GjBdG+jpZSIb +B0En0+t/JOwvqUAhzVStz/j9LgBza0P8ACd/s2Z/zjpot2JTXDofF0mbiGwMz4Em +/dOT3QhUr3QqFY/Q6T7c/wW7KbUXpNjwvLAV86A9Oojq32Z3ppJPnnDoLxLWvn8f +4rBdhhKrFhRZBYd91r3OExUIAEkFH9cmgPusjMsxggG6MIIBtgIBAzBTME4xKzAp +BgNVBAoMInVzZXJzeXMucmVkaGF0LmNvbSBTZWN1cml0eSBEb21haW4xHzAdBgNV +BAMMFkNBIFNpZ25pbmcgQ2VydGlmaWNhdGUCAQYwCQYFKw4DAhoFAKA+MBcGCSqG +SIb3DQEJAzEKBggrBgEFBQcMAjAjBgkqhkiG9w0BCQQxFgQUeIRBuSA10uyZK8LB +yc5Abz4f74AwDQYJKoZIhvcNAQEBBQAEggEAC1DFoKDcAzJUdIIucV61TqQtbBJT +H8hhnln3+TwAO+u3X55o74xZMgawy/3Hkt3CjYxYmWIYY9MZILb2UeD0VZz63yzq +F9tEZu2IhlvaOgP6NLcu8SxDImQ/GuvPIvGkGg0m/X3cwCHKymH7ZXAUfxQXgqbw +CAMc+DH99xx0yotaAr5HE9tauNJejo4CDVYwUn/5syTcw3molt2Ely2FIFEyI3HD +yPmP2OHw/xqlBhFvnoecbtpTq2DiWGPWJHSnzcdInuXudHHaIsribXK8HGw2MnCD +8Sq7UsrvBe50v0YebYzQdXYrsnluNc+Cwm2PdDQDfPT39e7iwGSLGi4KrQ== +-----END CERTIFICATE REQUEST----- +.if + +.TP +(4) Submit the signed certificate request through the CA end-entities page: +.IP +.nf +(a) Open the end-entities page. + +(b) Select the "Signed CMC-Authenticated User Certificate Enrollment" profile. + +(c) Paste the content of the output file into the first text area of this form. + +(d) Remove the "-----BEGIN CERTIFICATE REQUEST-----" header and the "-----END CERTIFICATE REQUEST-----" footer from the pasted content. + +(e) Fill in the contact information, and submit the form. +.if + +.TP +(5) The certificate is immediately processed and returned since a signed request was sent and the CMCAuth plug-in was enabled: +.IP +.nf +Congratulations, your request has been processed successfully + +Your request ID is \fB7\fP. + +\fBOutputs\fP + +* Certificate Pretty Print + + Certificate: + Data: + Version: v3 + Serial Number: 0x7 + Signature Algorithm: SHA256withRSA - 1.2.840.113549.1.1.11 + Issuer: CN=CA Signing Certificate,O=example.com Security Domain + Validity: + Not Before: Thursday, July 21, 2016 6:28:20 PM MDT America/Denver + Not After: Tuesday, January 17, 2017 6:28:20 PM MST America/Denver + Subject: CN=CMCEnroll Test Certificate + Subject Public Key Info: + Algorithm: RSA - 1.2.840.113549.1.1.1 + Public Key: + Exponent: 65537 + Public Key Modulus: (2048 bits) : + DA:99:00:3A:A6:C2:BB:4E:78:9C:DC:30:2D:23:20:0C: + 0A:4E:C5:2B:73:EE:4A:C7:89:4A:B4:7F:0B:B5:B4:E6: + D3:EF:AE:5A:79:BD:42:B1:A6:67:00:F8:F8:37:00:03: + 69:E6:05:4C:40:EA:6C:EA:B8:80:BE:82:BB:E8:D2:93: + 93:0E:0C:7B:4F:42:A3:06:9D:ED:AC:BD:20:10:58:E1: + 0A:AA:06:64:67:7D:3D:CC:9B:A5:39:B4:95:9E:AA:FA: + B5:70:89:30:A3:1C:C7:96:58:2C:18:11:8C:41:DB:88: + ED:44:63:85:06:31:DE:9F:AC:AC:64:9E:D1:F3:3B:6E: + A2:BE:01:4E:9A:26:1E:2B:D2:37:35:03:AA:42:BF:FD: + 97:30:E6:35:21:4C:E6:8C:81:27:36:AD:91:58:EA:67: + B1:64:38:50:39:9A:D6:BF:2C:53:32:A0:36:19:2E:86: + 33:D4:E5:4E:58:1A:DF:7E:D2:38:AE:AA:FD:78:75:B2: + A2:ED:42:4D:DC:33:ED:90:45:D9:34:EA:C5:AC:68:2A: + 2A:17:54:A8:B8:6B:76:6F:B1:FC:78:30:FD:A6:68:48: + 31:58:5C:E3:7D:8C:54:C5:C8:C5:32:52:45:97:66:AE: + 6C:7F:08:21:59:40:B6:AB:80:EC:6D:FB:C7:EB:C8:75 + Extensions: + Identifier: Authority Key Identifier - 2.5.29.35 + Critical: no + Key Identifier: + BB:36:98:5D:65:CB:88:E0:87:23:37:6F:5B:F7:AF:8B: + 8A:EB:BA:B5 + Identifier: Authority Info Access: - 1.3.6.1.5.5.7.1.1 + Critical: no + Access Description: + Method #0: ocsp + Location #0: URIName: http://pki.example.com:8080/ca/ocsp + Identifier: Key Usage: - 2.5.29.15 + Critical: yes + Key Usage: + Digital Signature + Non Repudiation + Key Encipherment + Identifier: Extended Key Usage: - 2.5.29.37 + Critical: no + Extended Key Usage: + 1.3.6.1.5.5.7.3.2 + 1.3.6.1.5.5.7.3.4 + Signature: + Algorithm: SHA256withRSA - 1.2.840.113549.1.1.11 + Signature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ingerPrint + MD2: + C2:58:80:9F:03:7D:5A:C2:3A:C2:42:D9:B8:CF:2D:17 + MD5: + 5F:D3:7C:1D:1F:59:3D:11:5E:B4:BE:75:D7:61:47:C6 + SHA-1: + F4:29:98:68:76:3F:41:FD:5E:E9:C3:F6:8A:3A:25:F3: + 5C:A9:71:27 + SHA-256: + 66:8F:00:98:D4:FF:F1:E4:35:F2:8E:54:26:AD:98:02: + 8F:6C:98:02:49:0B:A7:E5:98:41:1D:FE:92:E1:6A:57 + SHA-512: + E3:DB:3E:FB:9F:5F:CF:6D:79:1A:15:68:1A:42:5E:73: + 9A:ED:15:98:1D:D9:31:AF:00:45:37:1E:8A:98:C1:EA: + F0:DF:57:E9:A7:F7:19:01:5B:79:2B:79:07:CE:66:D6: + D6:C3:42:C9:D5:EE:50:71:7D:A5:94:DF:25:E6:CC:49 + +* Certificate Base-64 Encoded + +-----BEGIN CERTIFICATE----- +MIIDkjCCAnqgAwIBAgIBBzANBgkqhkiG9w0BAQsFADBOMSswKQYDVQQKDCJ1c2Vy +c3lzLnJlZGhhdC5jb20gU2VjdXJpdHkgRG9tYWluMR8wHQYDVQQDDBZDQSBTaWdu +aW5nIENlcnRpZmljYXRlMB4XDTE2MDcyMjAwMjgyMFoXDTE3MDExODAxMjgyMFow +JTEjMCEGA1UEAxMaQ01DRW5yb2xsIFRlc3QgQ2VydGlmaWNhdGUwggEiMA0GCSqG +SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDamQA6psK7Tnic3DAtIyAMCk7FK3PuSseJ +SrR/C7W05tPvrlp5vUKxpmcA+Pg3AANp5gVMQOps6riAvoK76NKTkw4Me09Cowad +7ay9IBBY4QqqBmRnfT3Mm6U5tJWeqvq1cIkwoxzHllgsGBGMQduI7URjhQYx3p+s +rGSe0fM7bqK+AU6aJh4r0jc1A6pCv/2XMOY1IUzmjIEnNq2RWOpnsWQ4UDma1r8s +UzKgNhkuhjPU5U5YGt9+0jiuqv14dbKi7UJN3DPtkEXZNOrFrGgqKhdUqLhrdm+x +/Hgw/aZoSDFYXON9jFTFyMUyUkWXZq5sfwghWUC2q4DsbfvH68h1AgMBAAGjgaMw +gaAwHwYDVR0jBBgwFoAUuzaYXWXLiOCHIzdvW/evi4rrurUwTgYIKwYBBQUHAQEE +QjBAMD4GCCsGAQUFBzABhjJodHRwOi8vcGtpLWRlc2t0b3AudXNlcnN5cy5yZWRo +YXQuY29tOjgwODAvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBeAwHQYDVR0lBBYwFAYI +KwYBBQUHAwIGCCsGAQUFBwMEMA0GCSqGSIb3DQEBCwUAA4IBAQBti5nS6dNOf1Ug +pn+ADHK0MMVPy9SsV4XX0sp1kPcvVxHLZxYIDEwj0qWnLk4hOfXVx20L3K1I4pL/ +mcX8zw6JabkJup8OhKuBMqeLmTDfdS9sYVqch3faLOpAhSDy3pV2a9cLjIglYgAt +BDDwJEtkKkrnNwSivK23f7qqdEEsVenlS5IYvBjc/EvqFRjOsHo6hGTiMRxkCnk+ +gG5DEjCKKmdvVktWVcdWhocn5MMoygXSvQtdEKJOlp1bKqALm7a7jxUf06954DjT +8e3V8fDr+GZWPy9PSpMOLhHz9xs3YQjkSpJMYOMeCg1h8q+y40g5dKpeMlur81U7 +axszSMsh +-----END CERTIFICATE----- + +* Certificate Imports +---------------------- +| Import Certificate | +---------------------- +.if + +.TP +(6) Use the agent page to search for the new certificate: +.IP +.nf +Certificate 0x07 + +Certificate contents + + Certificate: + Data: + Version: v3 + Serial Number: 0x7 + Signature Algorithm: SHA256withRSA - 1.2.840.113549.1.1.11 + Issuer: CN=CA Signing Certificate,O=example.com Security Domain + Validity: + Not Before: Thursday, July 21, 2016 6:28:20 PM MDT America/Denver + Not After: Tuesday, January 17, 2017 6:28:20 PM MST America/Denver + Subject: CN=CMCEnroll Test Certificate + Subject Public Key Info: + Algorithm: RSA - 1.2.840.113549.1.1.1 + Public Key: + Exponent: 65537 + Public Key Modulus: (2048 bits) : + DA:99:00:3A:A6:C2:BB:4E:78:9C:DC:30:2D:23:20:0C: + 0A:4E:C5:2B:73:EE:4A:C7:89:4A:B4:7F:0B:B5:B4:E6: + D3:EF:AE:5A:79:BD:42:B1:A6:67:00:F8:F8:37:00:03: + 69:E6:05:4C:40:EA:6C:EA:B8:80:BE:82:BB:E8:D2:93: + 93:0E:0C:7B:4F:42:A3:06:9D:ED:AC:BD:20:10:58:E1: + 0A:AA:06:64:67:7D:3D:CC:9B:A5:39:B4:95:9E:AA:FA: + B5:70:89:30:A3:1C:C7:96:58:2C:18:11:8C:41:DB:88: + ED:44:63:85:06:31:DE:9F:AC:AC:64:9E:D1:F3:3B:6E: + A2:BE:01:4E:9A:26:1E:2B:D2:37:35:03:AA:42:BF:FD: + 97:30:E6:35:21:4C:E6:8C:81:27:36:AD:91:58:EA:67: + B1:64:38:50:39:9A:D6:BF:2C:53:32:A0:36:19:2E:86: + 33:D4:E5:4E:58:1A:DF:7E:D2:38:AE:AA:FD:78:75:B2: + A2:ED:42:4D:DC:33:ED:90:45:D9:34:EA:C5:AC:68:2A: + 2A:17:54:A8:B8:6B:76:6F:B1:FC:78:30:FD:A6:68:48: + 31:58:5C:E3:7D:8C:54:C5:C8:C5:32:52:45:97:66:AE: + 6C:7F:08:21:59:40:B6:AB:80:EC:6D:FB:C7:EB:C8:75 + Extensions: + Identifier: Authority Key Identifier - 2.5.29.35 + Critical: no + Key Identifier: + BB:36:98:5D:65:CB:88:E0:87:23:37:6F:5B:F7:AF:8B: + 8A:EB:BA:B5 + Identifier: Authority Info Access: - 1.3.6.1.5.5.7.1.1 + Critical: no + Access Description: + Method #0: ocsp + Location #0: URIName: http://pki.example.com:8080/ca/ocsp + Identifier: Key Usage: - 2.5.29.15 + Critical: yes + Key Usage: + Digital Signature + Non Repudiation + Key Encipherment + Identifier: Extended Key Usage: - 2.5.29.37 + Critical: no + Extended Key Usage: + 1.3.6.1.5.5.7.3.2 + 1.3.6.1.5.5.7.3.4 + Signature: + Algorithm: SHA256withRSA - 1.2.840.113549.1.1.11 + Signature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ingerPrint + MD2: + C2:58:80:9F:03:7D:5A:C2:3A:C2:42:D9:B8:CF:2D:17 + MD5: + 5F:D3:7C:1D:1F:59:3D:11:5E:B4:BE:75:D7:61:47:C6 + SHA-1: + F4:29:98:68:76:3F:41:FD:5E:E9:C3:F6:8A:3A:25:F3: + 5C:A9:71:27 + SHA-256: + 66:8F:00:98:D4:FF:F1:E4:35:F2:8E:54:26:AD:98:02: + 8F:6C:98:02:49:0B:A7:E5:98:41:1D:FE:92:E1:6A:57 + SHA-512: + E3:DB:3E:FB:9F:5F:CF:6D:79:1A:15:68:1A:42:5E:73: + 9A:ED:15:98:1D:D9:31:AF:00:45:37:1E:8A:98:C1:EA: + F0:DF:57:E9:A7:F7:19:01:5B:79:2B:79:07:CE:66:D6: + D6:C3:42:C9:D5:EE:50:71:7D:A5:94:DF:25:E6:CC:49 + +Certificate request info + +Request ID: 7 + +Installing this certificate in a server + +The following format can be used to install this certificate into a server. + +Base 64 encoded certificate + +-----BEGIN CERTIFICATE----- +MIIDkjCCAnqgAwIBAgIBBzANBgkqhkiG9w0BAQsFADBOMSswKQYDVQQKDCJ1c2Vy +c3lzLnJlZGhhdC5jb20gU2VjdXJpdHkgRG9tYWluMR8wHQYDVQQDDBZDQSBTaWdu +aW5nIENlcnRpZmljYXRlMB4XDTE2MDcyMjAwMjgyMFoXDTE3MDExODAxMjgyMFow +JTEjMCEGA1UEAxMaQ01DRW5yb2xsIFRlc3QgQ2VydGlmaWNhdGUwggEiMA0GCSqG +SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDamQA6psK7Tnic3DAtIyAMCk7FK3PuSseJ +SrR/C7W05tPvrlp5vUKxpmcA+Pg3AANp5gVMQOps6riAvoK76NKTkw4Me09Cowad +7ay9IBBY4QqqBmRnfT3Mm6U5tJWeqvq1cIkwoxzHllgsGBGMQduI7URjhQYx3p+s +rGSe0fM7bqK+AU6aJh4r0jc1A6pCv/2XMOY1IUzmjIEnNq2RWOpnsWQ4UDma1r8s +UzKgNhkuhjPU5U5YGt9+0jiuqv14dbKi7UJN3DPtkEXZNOrFrGgqKhdUqLhrdm+x +/Hgw/aZoSDFYXON9jFTFyMUyUkWXZq5sfwghWUC2q4DsbfvH68h1AgMBAAGjgaMw +gaAwHwYDVR0jBBgwFoAUuzaYXWXLiOCHIzdvW/evi4rrurUwTgYIKwYBBQUHAQEE +QjBAMD4GCCsGAQUFBzABhjJodHRwOi8vcGtpLWRlc2t0b3AudXNlcnN5cy5yZWRo +YXQuY29tOjgwODAvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBeAwHQYDVR0lBBYwFAYI +KwYBBQUHAwIGCCsGAQUFBwMEMA0GCSqGSIb3DQEBCwUAA4IBAQBti5nS6dNOf1Ug +pn+ADHK0MMVPy9SsV4XX0sp1kPcvVxHLZxYIDEwj0qWnLk4hOfXVx20L3K1I4pL/ +mcX8zw6JabkJup8OhKuBMqeLmTDfdS9sYVqch3faLOpAhSDy3pV2a9cLjIglYgAt +BDDwJEtkKkrnNwSivK23f7qqdEEsVenlS5IYvBjc/EvqFRjOsHo6hGTiMRxkCnk+ +gG5DEjCKKmdvVktWVcdWhocn5MMoygXSvQtdEKJOlp1bKqALm7a7jxUf06954DjT +8e3V8fDr+GZWPy9PSpMOLhHz9xs3YQjkSpJMYOMeCg1h8q+y40g5dKpeMlur81U7 +axszSMsh +-----END CERTIFICATE----- + +Base 64 encoded certificate with CA certificate chain in pkcs7 format + +-----BEGIN PKCS7----- +MIIHlQYJKoZIhvcNAQcCoIIHhjCCB4ICAQExADAPBgkqhkiG9w0BBwGgAgQAoIIH +ZjCCA5IwggJ6oAMCAQICAQcwDQYJKoZIhvcNAQELBQAwTjErMCkGA1UECgwidXNl +cnN5cy5yZWRoYXQuY29tIFNlY3VyaXR5IERvbWFpbjEfMB0GA1UEAwwWQ0EgU2ln +bmluZyBDZXJ0aWZpY2F0ZTAeFw0xNjA3MjIwMDI4MjBaFw0xNzAxMTgwMTI4MjBa +MCUxIzAhBgNVBAMTGkNNQ0Vucm9sbCBUZXN0IENlcnRpZmljYXRlMIIBIjANBgkq +hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2pkAOqbCu054nNwwLSMgDApOxStz7krH +iUq0fwu1tObT765aeb1CsaZnAPj4NwADaeYFTEDqbOq4gL6Cu+jSk5MODHtPQqMG +ne2svSAQWOEKqgZkZ309zJulObSVnqr6tXCJMKMcx5ZYLBgRjEHbiO1EY4UGMd6f +rKxkntHzO26ivgFOmiYeK9I3NQOqQr/9lzDmNSFM5oyBJzatkVjqZ7FkOFA5mta/ +LFMyoDYZLoYz1OVOWBrfftI4rqr9eHWyou1CTdwz7ZBF2TTqxaxoKioXVKi4a3Zv +sfx4MP2maEgxWFzjfYxUxcjFMlJFl2aubH8IIVlAtquA7G37x+vIdQIDAQABo4Gj +MIGgMB8GA1UdIwQYMBaAFLs2mF1ly4jghyM3b1v3r4uK67q1ME4GCCsGAQUFBwEB +BEIwQDA+BggrBgEFBQcwAYYyaHR0cDovL3BraS1kZXNrdG9wLnVzZXJzeXMucmVk +aGF0LmNvbTo4MDgwL2NhL29jc3AwDgYDVR0PAQH/BAQDAgXgMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDBDANBgkqhkiG9w0BAQsFAAOCAQEAbYuZ0unTTn9V +IKZ/gAxytDDFT8vUrFeF19LKdZD3L1cRy2cWCAxMI9Klpy5OITn11cdtC9ytSOKS +/5nF/M8OiWm5CbqfDoSrgTKni5kw33UvbGFanId32izqQIUg8t6VdmvXC4yIJWIA +LQQw8CRLZCpK5zcEorytt3+6qnRBLFXp5UuSGLwY3PxL6hUYzrB6OoRk4jEcZAp5 +PoBuQxIwiipnb1ZLVlXHVoaHJ+TDKMoF0r0LXRCiTpadWyqgC5u2u48VH9OveeA4 +0/Ht1fHw6/hmVj8vT0qTDi4R8/cbN2EI5EqSTGDjHgoNYfKvsuNIOXSqXjJbq/NV +O2sbM0jLITCCA8wwggK0oAMCAQICAQEwDQYJKoZIhvcNAQELBQAwTjErMCkGA1UE +CgwidXNlcnN5cy5yZWRoYXQuY29tIFNlY3VyaXR5IERvbWFpbjEfMB0GA1UEAwwW +Q0EgU2lnbmluZyBDZXJ0aWZpY2F0ZTAeFw0xNjA3MjEyMzQwMjVaFw0zNjA3MjEy +MzQwMjVaME4xKzApBgNVBAoMInVzZXJzeXMucmVkaGF0LmNvbSBTZWN1cml0eSBE +b21haW4xHzAdBgNVBAMMFkNBIFNpZ25pbmcgQ2VydGlmaWNhdGUwggEiMA0GCSqG +SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCplqIpKjj6R9CS1t0mdUj6I753Y3SC6g7h +rkZqrXC7s2bZjbmO2VcK17etRtUgggaBIsvznFAijBlacNDNeQ597IyZnfRdkeZa +xk9njFln1U69eUchMCvT59JsUwzftHmeFg2PVOGYONqmWCIZHxkk0eY4QOK7N7jT +hZtBJS6g7phsNxF4yTsvkVEbzW2OD45c/PfkNqOjNP1zJjGM8VbV7rCrtW70yiIl +qFgl0eYHu/BqE//K3nq/s8bkl4iknlVdpsrwkIZjBwA9q4pP+4Ws7mNs7QvIfRxd +PTzEnitnr+j5c0lfzxKo/buW4DnG6nokJM0eiDnEoiQp/aOwfgFDAgMBAAGjgbQw +gbEwHwYDVR0jBBgwFoAUuzaYXWXLiOCHIzdvW/evi4rrurUwDwYDVR0TAQH/BAUw +AwEB/zAOBgNVHQ8BAf8EBAMCAcYwHQYDVR0OBBYEFLs2mF1ly4jghyM3b1v3r4uK +67q1ME4GCCsGAQUFBwEBBEIwQDA+BggrBgEFBQcwAYYyaHR0cDovL3BraS1kZXNr +dG9wLnVzZXJzeXMucmVkaGF0LmNvbTo4MDgwL2NhL29jc3AwDQYJKoZIhvcNAQEL +BQADggEBADVGCyuuZFdJ2vc5rTRhY3uGpM+BQUQDoX/0WL7R+P9M9/L1vxOn2ZH2 ++gh6wuKTT3y+nNKv/B9JiKwH7eJJEJU8iQfbXReamLwn1DJmfszOuuFP/e53+zUl +LvTyBXDX4fvzvSKFVHe4BHq0SEic27JhwHAnHyIilxbDPuh2xLfpR+O35W/3kgNn +FEvOGwvl5WZiqbHtUfDy/6ys54EXmZjITce96WJRDdKjqSSCxDAtRVVBMael55z/ +5tfoGN09hayHFFOyZtZgp5Z91XC8ZEVNnPbRo+MWKx/LXjKEBy2U4qnv+eIft/6V +BA4EgEwB53sf7ht901zQ26XjXqu9tHgxAA== +-----END PKCS7----- +.if + +.SH AUTHORS +Matthew Harmsen <mharmsen@redhat.com>. + +.SH COPYRIGHT +Copyright (c) 2016 Red Hat, Inc. This is licensed under the GNU General Public +License, version 2 (GPLv2). A copy of this license is available at +http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt. + +.SH SEE ALSO +.BR CMCRequest(1), CMCResponse(1), CMCRevoke(1), pki(1) |
