Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

getcert-resubmit(1) [centos man page]

certmonger(1)						      General Commands Manual						     certmonger(1)

NAME
getcert SYNOPSIS
getcert resubmit [options] DESCRIPTION
Tells certmonger to generate (or regenerate) a signing request and submit (or resubmit) the signing request to a CA for signing. SPECIFYING REQUESTS BY NICKNAME
-i NAME Resubmit a signing request for the tracking request which has this nickname. If this option is not specified, and a tracking entry which matches the key and certificate storage options which are specified already exists, that entry will be used. If not speci- fied, the location of the certificate should be specified with either a combination of the -d and -n options, or with the -f option. SPECIFYING REQUESTS BY CERTIFICATE LOCATION
-d DIR The certificate is in the NSS database in the specified directory. -n NAME The certificate in the NSS database named with -d has the specified nickname. Only valid with -d. -t TOKEN If the NSS database has more than one token available, the certificate is stored in this token. This argument only rarely needs to be specified. Only valid with -d. -f FILE The certificate is stored in the named file. ENROLLMENT OPTIONS
-c NAME Submit the new signing request to the specified CA rather than the one which was previously associated with this certificate. The name of the CA should correspond to one listed by getcert list-cas. -T NAME Request a certificate using the named profile, template, or certtype, from the specified CA. -I NAME Assign the specified nickname to this task, replacing the previous nickname. SIGNING REQUEST OPTIONS
-N NAME Change the subject name to include in the signing request. -u keyUsage Add an extensionRequest for the specified keyUsage to the signing request. The keyUsage value is expected to be one of these names: digitalSignature nonRepudiation keyEncipherment dataEncipherment keyAgreement keyCertSign cRLSign encipherOnly decipherOnly -U EKU Change the extendedKeyUsage value specified in an extendedKeyUsage extension part of the extensionRequest attribute in the signing request. The EKU value is expected to be an object identifier (OID). -K NAME Change the Kerberos principal name specified as part of a subjectAltName extension part of the extensionRequest attribute in the signing request. -E EMAIL Change the email address specified as part of a subjectAltName extension part of the extensionRequest attribute in the signing request. -D DNSNAME Change the DNS name specified as part of a subjectAltName extension part of the extensionRequest attribute in the signing request. OTHER OPTIONS
-B command When ever the certificate is saved to the specified location, run the specified command as the client user before saving the cer- tificate. -C command When ever the certificate is saved to the specified location, run the specified command as the client user after saving the certifi- cate. -v Be verbose about errors. Normally, the details of an error received from the daemon will be suppressed if the client can make a diagnostic suggestion. BUGS
Please file tickets for any that you find at https://fedorahosted.org/certmonger/ SEE ALSO
certmonger(8) getcert(1) getcert-list(1) getcert-list-cas(1) getcert-request(1) getcert-start-tracking(1) getcert-stop-tracking(1) certmon- ger-certmaster-submit(8) certmonger-ipa-submit(8) certmonger_selinux(8) certmonger Manual 14 June 2012 certmonger(1)

Check Out this Related Man Page

certmonger(8)						      System Manager's Manual						     certmonger(8)

NAME
certmaster-submit SYNOPSIS
certmaster-submit [-h serverHost] [-c cafile] [-C capath] [csrfile] DESCRIPTION
certmaster-submit is the helper which certmonger uses to make requests to certmaster-based CAs. It is not normally run interactively, but it can be for troubleshooting purposes. The signing request which is to be submitted should either be in a file whose name is given as an argument, or fed into certmaster-submit via stdin. OPTIONS
-h serverHost Submit the request to the certmaster instance running on the named host. The default is localhost:51235 if a file named /var/run/certmaster.pid is found on the local system, and is read from /etc/certmaster/minion.conf if that file is not found. -c cafile Submit the request over HTTPS instead of HTTP, and only trust the server if its certificate was issued by the CA whose certificate is in the named file. -C capath Submit the request over HTTPS instead of HTTP, and only trust the server if its certificate was issued by a CA whose certificate is in a file in the named directory. EXIT STATUS
0 if the certificate was issued. The certificate will be printed. 1 if the CA is still thinking. A cookie value will be printed. 2 if the CA rejected the request. An error message may be printed. 3 if the CA was unreachable. An error message may be printed. 4 if critical configuration information is missing. An error message may be printed. FILES
/var/run/certmaster.pid the certmaster service's PID file. Its presence is taken to indicate that this system is a CA, and that requests should be submit- ted to a certmaster server running on the local system. /etc/certmaster/minion.conf the certmaster minion configuration file. If there is no indication that the local system is a certmaster server, then this file is consulted to determine the location of the certmaster server. KNOWN BUGS
Checking for the existence of certmaster's PID file is a terrible way to figure out whether we're a minion or not. BUGS
Please file tickets for any that you find at https://fedorahosted.org/certmonger/ SEE ALSO
certmonger(8) getcert(1) getcert-list(1) getcert-list-cas(1) getcert-resubmit(1) getcert-start-tracking(1) getcert-stop-tracking(1) cert- monger-dogtag-ipa-renew-agent-submit(8) certmonger-ipa-submit(8) certmonger_selinux(8) certmonger Manual 7 June 2010 certmonger(8)
Man Page