EJBCA, J2EE PKI Certificate Authority: 3.8.1 released


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements Software Releases - RSS News EJBCA, J2EE PKI Certificate Authority: 3.8.1 released
# 1  
Old 01-29-2009
EJBCA, J2EE PKI Certificate Authority: 3.8.1 released

EJBCA is an enterprise class PKI Certificate Authority built on J2EE technology. It is a robust, high performance, platform independent, flexible, and component based CA to be used standalone or integrated in other J2EE applications.

ImageImage

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

4 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Does vsftpd support user access with client certificate with priv/pub key + vsftpd certificate?

:rolleyes:I am trying to setup all certificate based client-server environment in Linux using vsftpd and curl with openssl. I would like to make a user access with vsftpd certificate and user own client certificate (self-signed) with private/public key. I don't see google posts about the my plan... (4 Replies)
Discussion started by: gogogo
4 Replies

2. Programming

J2EE prerequisites

Hi guys, I'm going to start studding about J2EE in a couple of weeks. I have no idea about its technologies. what prerequisites do i need. I only know java and have basic knowledge about HTML. I have a solid knowledge on database. 1. Do i need java script or CSS knowledge for JSP and JSF? 2.... (1 Reply)
Discussion started by: majid.merkava
1 Replies

3. Solaris

PKI/CAC on Solaris 10 w/ Apache

I am looking for someone who has implemented CAC/PKI authentication on Apache 2.2.x and Solaris 10. Not Linux. I need to compare notes and my plan of attack. (0 Replies)
Discussion started by: LittleLebowski
0 Replies

4. Solaris

J2EE 1.4 on Solaris 8

Hi, I'm tryng to install the J2EE 1.4 on Solaris 8, but I'm getting an error message, saying I don't have enough space on the device....but I DO have...heres a df -k: I'm trying to install in /export/home....... Help?? (12 Replies)
Discussion started by: Zarnick
12 Replies
Login or Register to Ask a Question
PKI --SIGNCRL(1)						    strongSwan							  PKI --SIGNCRL(1)

NAME
pki --signcrl - Issue a Certificate Revocation List (CRL) using a CA certificate and key SYNOPSIS
pki --signcrl --cakey file|--cakeyid hex --cacert file [--lifetime days] [--lastcrl crl] [--basecrl crl] [--crluri uri] [--digest digest] [[--reason reason] [--date ts] --cert file|--serial hex] [--outform encoding] [--debug level] pki --signcrl --options file pki --signcrl -h | --help DESCRIPTION
This sub-command of pki(1) is used to issue a Certificate Revocation List (CRL) using a CA certificate and private key. OPTIONS
-h, --help Print usage information with a summary of the available options. -v, --debug level Set debug level, default: 1. -+, --options file Read command line options from file. -k, --cakey file CA private key file. Either this or --cakeyid is required. -x, --cakeyid hex Key ID of a CA private key on a smartcard. Either this or --cakey is required. -c, --cacert file CA certificate file. Required. -l, --lifetime days Days until the CRL gets a nextUpdate, default: 15. -a, --lastcrl crl CRL of lastUpdate to copy revocations from. -b, --basecrl crl Base CRL to create a delta CRL for. -u, --crluri uri Freshest delta CRL URI to include in CRL. Can be used multiple times. -g, --digest digest Digest to use for signature creation. One of md5, sha1, sha224, sha256, sha384, or sha512. Defaults to sha1. -f, --outform encoding Encoding of the created certificate file. Either der (ASN.1 DER) or pem (Base64 PEM), defaults to der. Revoked Certificates Multiple revoked certificates can be added to the CRL by either providing the certificate file or the respective serial number directly. A reason and a timestamp can be configured for each revocation (they have to be given before each certificate/serial on the command line). -r, --reason reason The reason why the certificate was revoked. One of key-compromise, ca-compromise, affiliation-changed, superseded, cessa- tion-of-operation, or certificate-hold. -d, --date ts Revocation date as Unix timestamp. Defaults to the current time. -z, --cert file Certificate file to revoke. -s, --serial hex Hexadecimal encoded serial number of the certificate to revoke. EXAMPLES
Revoke a certificate: pki --signcrl --cacert ca_cert.der --cakey ca_key.der --reason superseded --cert cert.der > crl.der Update an existing CRL with two new revocations, using the certificate's serial number, but no reason: pki --signcrl --cacert ca_cert.der --cakey ca_key.der --lastcrl old_crl.der --serial 0123 --serial 0345 > crl.der SEE ALSO
pki(1) 5.1.1 2013-08-12 PKI --SIGNCRL(1)