Script to check Digital Certificates Expiration


 
Thread Tools Search this Thread
Top Forums Shell Programming and Scripting Script to check Digital Certificates Expiration
# 1  
Old 02-13-2012
Script to check Digital Certificates Expiration

Hi All, I have certificates that are being used in my current Project and all the Certificates are of extension ( .pfx - Identities , .cert - trusted certificates etc). All these certificates will expire in some other time. Can someone help me out in providing a script that is used to check the Certificate expiry date and send me an email one week in advance saying that an certificate is getting expired. Hope everyone understood my requirement and hoping you all help me out in getting this done, Thanks and support for all of your help. Regards, Srinivas
Login or Register to Ask a Question

Previous Thread | Next Thread

10 More Discussions You Might Find Interesting

1. HP-UX

How to check password expiration date of particular user?

Hi Guys, I am new to HP-UX and want to find expiration date of particular user please also note i don't have root access on that server. for e.g. i have user abc on my HP box and want to know when its password going to expire and also when its password changed last time. I also try to... (7 Replies)
Discussion started by: Yasin Rakhangi
7 Replies

2. Solaris

Keytool command to check expiration dates of certificates

Friends, I'm in search of a keytool command which pulls the expiration dates of certificates in keystore. I have around 200 certs in my keystore, so would like to know if we have any script/command which can pull expiration dates of certificates at one run. (3 Replies)
Discussion started by: fop4658
3 Replies

3. AIX

Password expiration

Hi Admins, AIX 5.3 I know maxage value tells the system about password expiration policy. One of the user's maxage is 5 weeks.But he changed the password long backup at 2008 according to lastupdate value. Since maxage is 5, the password should expire every 5 weeks.But how come... (4 Replies)
Discussion started by: newaix
4 Replies

4. Shell Programming and Scripting

UNIX Script to Check the Certificates

Hi All, Warm New Year Wishes to every one I am New to UNIX and i don't have much Experience on UNIX Scripting, so can someone help me out on below Request I have Digital certificates that are being used in My current project. All these Certificates are of Extensions (.cert and .pfx)... (1 Reply)
Discussion started by: manukonda0102
1 Replies

5. Shell Programming and Scripting

Shell script to create multiple OpenSSL Certificates

I need to create a script that will generate a bunch of OpenSSL Certificates signed by my own CA. The certificates being generated are for testing purposes only. But what I need is the following Root CA 512 768 1024 1280 1536 1792 2048 4096 I need basically 64 combinations. Each... (4 Replies)
Discussion started by: krisarmstrong
4 Replies

6. Shell Programming and Scripting

script to check if another script is running and if so, then sleep for sometime and check again

Hi, I am a unix newbie. I need to write a script to check wheteher another script is still running. If it is, then sleep for 30m and then check again if the script is running. If the script has stopped running then, I need to come out of the loop. I am using RHEL 5.2 (2 Replies)
Discussion started by: mathews
2 Replies

7. Cybersecurity

expiration of SSL Certificates

Does anyone know how to extract the expiration date of a Solaris 9 certificate? I have searched over the 'net and it seems this command ssl-cert-check comes up often but this does not work on my servers. Not sure how to extraxt the expiration dates of the SSL Certs so if anyone can help that would... (2 Replies)
Discussion started by: bluridge
2 Replies

8. Linux

password expiration ?!?

Hi All, I have this user on my /etc/shadow: mysql:$1$vmw4r078$4.lp6z2s0KJYHKXTuPG2x0:13556:0::12::: The 5 column is blank. Does it mean the user has no password expiration. Thanks in advance for any idea. (1 Reply)
Discussion started by: itik
1 Replies

9. Solaris

password expiration

Hello can anyone explain where can be found logic for user password expiration on solaris as well as on reliant UNIX?? there is not much help of /etc/security directory..does not exist! any help? (3 Replies)
Discussion started by: abdulaziz
3 Replies

10. UNIX for Dummies Questions & Answers

Script to check for a file, check for 2hrs. then quit

I wish to seach a Dir for a specific file, once the file is found i will perform additional logic. If the file is not found within two hours, i would like to exit. Logically, I'm looking for the best way to approach this Thanks for any assistance in advance. Note: I'm using a C shell and... (2 Replies)
Discussion started by: mmarsh
2 Replies
Login or Register to Ask a Question
cimtrust(8)						      System Manager's Manual						       cimtrust(8)

NAME
cimtrust - Add, remove or list X509 certificates in a PEM format trust store. SYNOPSIS
cimtrust -a [ -U certuser ] -f file -T ( a | e | s ) cimtrust -r -i issuer ( -n serialnumber | -S subject ) cimtrust -l [ -i issuer [ -n serialnumber | -S subject ] ] cimtrust --help cimtrust --version Remarks The cimtrust command requires that the cimserver is running. This command operates on a truststore on the local system only. DESCRIPTION
The add option of the cimtrust command adds an X509 certificate file of a specified type to the truststore. The certuser specifies the username to be associated with the certificate in the file. If no certuser is specified, the certificate may not be used to authenticate a user. The remove option of the cimtrust command removes the X509 certificate(s) matching the specified issuer and either serialnumber or subject from the truststore. The list option of the cimtrust command lists the X509 certificates in the truststore. The list can be filtered by issuer and either seri- alnumber or subject. Certificates in the trust store may be revoked by adding a Certificate Revocation List to the CRL store. For more information on CRL opera- tions see the cimcrl(8) command. Options cimtrust recognizes the following options: -a Adds a certificate to the truststore. If the specified file does not contain a valid X509 certificate an error mes- sage is returned and no action is taken. If the X509 certificate already exists in the truststore, an error message is returned. -r Removes certificate(s) from the truststore. If the truststore contains multiple certificates matching the specified issuer and subject, all the matching certificates are removed. If no certificate exists for the specified issuer and either serialnumber or subject , an error message is returned and no action is taken. -l Displays the X509 certificates in the truststore. -f file Specifies a PEM format file containing an X509 certificate. -U certuser Specifies a username to be associated with the specified certificate. The username specified should be a valid sys- tem user on the target system. -i issuer Specifies the issuer name of the certificate. -n serialnumber Specifies the serial number of the certificate. -S subject Specifies the subject name of the certificate. -T ( a | e | s ) Specifies the type of a certificate. The type must be one of the following: authority (a): root/intermediate authority certificates. Certificates of this type are added to the trusted certifi- cate store. The certuser is optional for authority certificates. If no certuser is specified, the certificate may not be used to authenticate a user. authority issued end-entity (e): Certificates of this type are not added to the trusted certificate store. The cer- tuser is required for authority issued end-entity certificates. Self-signed identity certificate (s): Certificates of this type are added to the trusted certificate store. The cer- tuser is required for self-signed identity certificates. --help Displays the command help message. --version Displays the CIM Server version. EXIT STATUS
When an error occurs, an error message is written to the standard error stream and a non-zero exit status value is returned. The following exit status values are defined: 0 Success 1 General error 2 Connection failed 3 Connection timed out 4 Certificate already exists 5 Certificate does not exist 6 Invalid system user EXAMPLES
Add the X509 self-signed identity certificate in the cert.pem file and associate it to certuser guest. This certificate will be added to the trusted certificate store: cimtrust -a -U guest -f cert.pem -T s Add the X509 authority root CA certificate in the ca.pem file with no certuser association. This certificate will be added to the trusted certificate store but may not be used to authenticate a user: cimtrust -a -f ca.pem -T a Add the X509 authority issued end-entity certificate in the user.pem file and associate it to certuser pegasus. This certificate may be used to authenticate user pegasus but will not be added to the trusted certificate store: cimtrust -a -f user.pem -U pegasus -T e Remove the certificate matching the specified issuer and serialnumber from the trust store: cimtrust -r -i "/C=US/ST=California/L=Cupertino/O=Smart & Secure/OU=Secure Software Division/CN=dev.admin.ss.com" -n 01 Remove the certificate(s) matching the specified issuer and subject from the trust store: cimtrust -r -i "/C=US/ST=California/L=Cupertino/O=Smart & Secure/OU=Secure Software Division/CN=dev.admin.ss.com" -S "/C=US/ST=Califor- nia/L=Cupertino/O=Smart & Secure/OU=Secure Software Division/CN=dev.admin.ss.com" List all the X509 certificates in the trust store: cimtrust -l SEE ALSO
cimserver(8), cimcrl(8), cimconfig(8). cimtrust(8)