EJBCA, J2EE PKI Certificate Authority: 3.8.1 released
EJBCA is an enterprise class PKI Certificate Authority built on J2EE technology. It is a robust, high performance, platform independent, flexible, and component based CA to be used standalone or integrated in other J2EE applications.
:rolleyes:I am trying to setup all certificate based client-server environment in Linux using vsftpd and curl with openssl.
I would like to make a user access with vsftpd certificate and user own client certificate (self-signed) with private/public key.
I don't see google posts about the my plan... (4 Replies)
Hi guys,
I'm going to start studding about J2EE in a couple of weeks. I have no idea about its technologies. what prerequisites do i need. I only know java and have basic knowledge about HTML. I have a solid knowledge on database.
1. Do i need java script or CSS knowledge for JSP and JSF?
2.... (1 Reply)
I am looking for someone who has implemented CAC/PKI authentication on Apache 2.2.x and Solaris 10. Not Linux. I need to compare notes and my plan of attack. (0 Replies)
Hi, I'm tryng to install the J2EE 1.4 on Solaris 8, but I'm getting an error message, saying I don't have enough space on the device....but I DO have...heres a df -k:
I'm trying to install in /export/home.......
Help?? (12 Replies)
PKI --SIGNCRL(1) strongSwan PKI --SIGNCRL(1)NAME
pki --signcrl - Issue a Certificate Revocation List (CRL) using a CA certificate and key
SYNOPSIS
pki --signcrl --cakey file|--cakeyid hex --cacert file [--lifetime days] [--lastcrl crl] [--basecrl crl] [--crluri uri] [--digest digest]
[[--reason reason] [--date ts] --cert file|--serial hex] [--outform encoding] [--debug level]
pki --signcrl --options file
pki --signcrl -h | --help
DESCRIPTION
This sub-command of pki(1) is used to issue a Certificate Revocation List (CRL) using a CA certificate and private key.
OPTIONS -h, --help
Print usage information with a summary of the available options.
-v, --debug level
Set debug level, default: 1.
-+, --options file
Read command line options from file.
-k, --cakey file
CA private key file. Either this or --cakeyid is required.
-x, --cakeyid hex
Key ID of a CA private key on a smartcard. Either this or --cakey is required.
-c, --cacert file
CA certificate file. Required.
-l, --lifetime days
Days until the CRL gets a nextUpdate, default: 15.
-a, --lastcrl crl
CRL of lastUpdate to copy revocations from.
-b, --basecrl crl
Base CRL to create a delta CRL for.
-u, --crluri uri
Freshest delta CRL URI to include in CRL. Can be used multiple times.
-g, --digest digest
Digest to use for signature creation. One of md5, sha1, sha224, sha256, sha384, or sha512. Defaults to sha1.
-f, --outform encoding
Encoding of the created certificate file. Either der (ASN.1 DER) or pem (Base64 PEM), defaults to der.
Revoked Certificates
Multiple revoked certificates can be added to the CRL by either providing the certificate file or the respective serial number directly. A
reason and a timestamp can be configured for each revocation (they have to be given before each certificate/serial on the command line).
-r, --reason reason
The reason why the certificate was revoked. One of key-compromise, ca-compromise, affiliation-changed, superseded, cessa-
tion-of-operation, or certificate-hold.
-d, --date ts
Revocation date as Unix timestamp. Defaults to the current time.
-z, --cert file
Certificate file to revoke.
-s, --serial hex
Hexadecimal encoded serial number of the certificate to revoke.
EXAMPLES
Revoke a certificate:
pki --signcrl --cacert ca_cert.der --cakey ca_key.der
--reason superseded --cert cert.der > crl.der
Update an existing CRL with two new revocations, using the certificate's serial number, but no reason:
pki --signcrl --cacert ca_cert.der --cakey ca_key.der
--lastcrl old_crl.der --serial 0123 --serial 0345 > crl.der
SEE ALSO pki(1)5.1.1 2013-08-12 PKI --SIGNCRL(1)