asc certs
Use this command to manage x509 and CA certificates.
Syntax
asc certs [options]
Option |
Description |
|||
-a, --authority |
Use this option when performing operations on a certificate authority (CA) certificate set. |
|||
-b or --bulkimport |
Perform bulk import of certificates from hosts into the database. The following options are available for this command:
|
|||
-c, --cert [file] |
The fully qualified certificate target file path. The contents of this file are overwritten. This option defines the certificate file location automatically. |
|||
--cabundle |
By default, CloudControl contains a bundle of certificates, but they are not imported. Use this command if you want to import the certificate bundle. The following options are available for this command: enable—Imports the certificate bundle into your installation. refresh—Refreshes the existing certificate bundle. disable—Removes the certificate bundle from your installation. |
|||
-d, --delete <service> |
Delete the specified CA certificate by service name. Implies |
|||
--fipsmodeon |
Enables FIPSMode |
|||
--fipsmodeoff |
Disables FIPSMode | |||
-g, --genselfsigned [file] |
Generate a self-signed certificate using a local key. This option accepts a temporary fully qualified filename as an argument with certificate data as contents. See |
|||
-h, --help |
Display usage text. |
|||
-i, --import <file> |
Validate and install a certificate issued by a CA. Requires a temporary qualified filename as an argument. The temporary file contains the certificate as issued by the certificate authority. The |
|||
-k, --key [file] |
The fully qualified key target file path. The contents of this file are overwritten. Specifying the |
|||
-l, --list |
Lists the certificates installed locally and descriptions of each. List output is one certificate per line with each value separated by a double length underscore ( The format is as follows: svc__t__cn__o__l__st__c__ou__exp__isd__s__ Where:
|
|||
-q, --csr |
Generate a certificate request using a local key. This option accepts a temporary qualified filename as an argument with certificate data as contents. One entry per line prefixed by a two character certificate datatype identifier. Sample temporary file contents (field separator is '__'): svc__t__cn__o__l__st__c__ou__exp__isd__s__v__icn__io__iou__key__dns__ips Where:
|
|||
-r, --random <length> |
Generate a random string of the specified length. |
|||
--rotate |
Perform password rotation for the secure keystore
|
|||
--sandns |
Returns a list of DNS entries of the CloudControl appliance and protected resources to be added as SAN entries to certificates and certificate requests. |
|||
--sanips |
Returns a list of IP addresses of the CloudControl appliance and protected resources to be added as SAN entries to certificates and certificate requests. |
|||
-s, --service |
The service to apply the certificate to. Valid values are:
|
|||
-t, --csrtool |
Runs the CSR tool which allows user to generate a CSR with SAN. |
|||
-v, --verbose |
Enable verbose output. |
|||
-vv |
Enable debug output. |
Examples
Import all certificates from CloudControl-protected hosts:
asc certs -b -y
List all certificates installed:
asc certs -l
List all certificate authority (CA) certificates:
asc certs -l -a
Validate and install a certificate for the CloudControl Management Console service:
asc certs -s gui --import /tmp/newCert.pem
Export the current key and certificate to files:
asc certs -k /foo/mykey.pem -c /foo/ssCert.pem
Delete the ca0025 service certificate authority certificate:
asc certs -a -d ca0025
Generate a 32 character random string:
asc certs -r 32
Imports the bundle of certificates:
asc certs -cabundle enable
Import the SSO signing keys:
asc certs -i /usr/local/asc/etc/ssosigncert.pem -s sso_signing
Enable FIPS mode:
asc certs --fipsmodeon
Discover the DNS entries that can be added as SAN entries:
asc certs --sandns
Discover the IP addresses that can be added as SAN entries:
asc certs --sanips