certmonger(1) General Commands Manual certmonger(1)NAME
selfsign-getcert
SYNOPSIS
selfsign-getcert request [options]
selfsign-getcert resubmit [options]
selfsign-getcert start-tracking [options]
selfsign-getcert stop-tracking [options]
selfsign-getcert list [options]
selfsign-getcert list-cas [options]
DESCRIPTION
The selfsign-getcert tool issues requests to a org.fedorahosted.certmonger service on behalf of the invoking user. It can ask the service
to begin enrollment, optionally generating a key pair to use, it can ask the service to begin monitoring a certificate in a specified loca-
tion for expiration, and optionally to refresh it when expiration nears, it can list the set of certificates that the service is already
monitoring, or it can list the set of CAs that the service is capable of using.
If no command is given as the first command-line argument, selfsign-getcert will print short usage information for each of its functions.
The selfsign-getcert tool behaves identically to the generic getcert tool when it is used with the -c SelfSign option.
BUGS
Please file tickets for any that you find at https://fedorahosted.org/certmonger/
SEE ALSO certmonger(8)getcert-list(1)getcert-list-cas(1)getcert-request(1)getcert-resubmit(1)getcert-start-tracking(1)getcert-stop-tracking(1)certmonger-certmaster-submit(8)certmonger-ipa-submit(8)certmonger_selinux(8)certmonger Manual 3 November 2009 certmonger(1)
Check Out this Related Man Page
certmonger(1) General Commands Manual certmonger(1)NAME
getcert
SYNOPSIS
getcert resubmit [options]
DESCRIPTION
Tells certmonger to generate (or regenerate) a signing request and submit (or resubmit) the signing request to a CA for signing.
SPECIFYING REQUESTS BY NICKNAME -i NAME
Resubmit a signing request for the tracking request which has this nickname. If this option is not specified, and a tracking entry
which matches the key and certificate storage options which are specified already exists, that entry will be used. If not speci-
fied, the location of the certificate should be specified with either a combination of the -d and -n options, or with the -f option.
SPECIFYING REQUESTS BY CERTIFICATE LOCATION -d DIR The certificate is in the NSS database in the specified directory.
-n NAME
The certificate in the NSS database named with -d has the specified nickname. Only valid with -d.
-t TOKEN
If the NSS database has more than one token available, the certificate is stored in this token. This argument only rarely needs to
be specified. Only valid with -d.
-f FILE
The certificate is stored in the named file.
ENROLLMENT OPTIONS -c NAME
Submit the new signing request to the specified CA rather than the one which was previously associated with this certificate. The
name of the CA should correspond to one listed by getcert list-cas.
-T NAME
Request a certificate using the named profile, template, or certtype, from the specified CA.
-I NAME
Assign the specified nickname to this task, replacing the previous nickname.
SIGNING REQUEST OPTIONS -N NAME
Change the subject name to include in the signing request.
-u keyUsage
Add an extensionRequest for the specified keyUsage to the signing request. The keyUsage value is expected to be one of these names:
digitalSignature
nonRepudiation
keyEncipherment
dataEncipherment
keyAgreement
keyCertSign
cRLSign
encipherOnly
decipherOnly
-U EKU Change the extendedKeyUsage value specified in an extendedKeyUsage extension part of the extensionRequest attribute in the signing
request. The EKU value is expected to be an object identifier (OID).
-K NAME
Change the Kerberos principal name specified as part of a subjectAltName extension part of the extensionRequest attribute in the
signing request.
-E EMAIL
Change the email address specified as part of a subjectAltName extension part of the extensionRequest attribute in the signing
request.
-D DNSNAME
Change the DNS name specified as part of a subjectAltName extension part of the extensionRequest attribute in the signing request.
OTHER OPTIONS -B command
When ever the certificate is saved to the specified location, run the specified command as the client user before saving the cer-
tificate.
-C command
When ever the certificate is saved to the specified location, run the specified command as the client user after saving the certifi-
cate.
-v Be verbose about errors. Normally, the details of an error received from the daemon will be suppressed if the client can make a
diagnostic suggestion.
BUGS
Please file tickets for any that you find at https://fedorahosted.org/certmonger/
SEE ALSO certmonger(8)getcert(1)getcert-list(1)getcert-list-cas(1)getcert-request(1)getcert-start-tracking(1)getcert-stop-tracking(1) certmon-
ger-certmaster-submit(8)certmonger-ipa-submit(8)certmonger_selinux(8)certmonger Manual 14 June 2012 certmonger(1)