asc certs
Use this command to manage x509 and CA certificates.
Syntax
asc certs [options]
Option |
Description |
-a, --authority |
Use this option when performing operations on a certificate authority (CA) certificate set. |
-b or --bulkimport |
Perform bulk import of certificates from hosts into the database. The following options are available for this command:
Note: This command imports vCenter and ESXi host certificates, not PCS certificates. |
-c, --cert [file] |
The fully qualified certificate target file path. The contents of this file are overwritten. This option defines the certificate file location automatically. |
--cabundle |
By default, CloudControl contains a bundle of certificates, but they are not imported. Use this command if you want to import the certificate bundle. The following options are available for this command: enable—Imports the certificate bundle into your installation. refresh—Refreshes the existing certificate bundle. disable—Removes the certificate bundle from your installation. |
-d, --delete <service> |
Delete the specified CA certificate by service name. Implies |
--fipsmodeon |
Enables FIPSMode |
--fipsmodeoff |
Disables FIPSMode |
-g, --genselfsigned [file] |
Generate a self-signed certificate using a local key. This option accepts a temporary fully qualified filename as an argument with certificate data as contents. See |
-h, --help |
Display usage text. |
-i, --import <file> |
Validate and install a certificate issued by a CA. Requires a temporary qualified filename as an argument. The temporary file contains the certificate as issued by the certificate authority. The |
-k, --key [file] |
The fully qualified key target file path. The contents of this file are overwritten. Specifying the |
-l, --list |
Lists the certificates installed locally and descriptions of each. List output is one certificate per line with each value separated by a double length underscore ( The format is as follows: svc__t__cn__o__l__st__c__ou__exp__isd__s__ Where:
|
-q, --csr |
Generate a certificate request using a local key. This option accepts a temporary qualified filename as an argument with certificate data as contents. One entry per line prefixed by a two character certificate datatype identifier. Sample temporary file contents (field separator is '__'): svc__t__cn__o__l__st__c__ou__exp__isd__s__v__icn__io__iou__key__dns__ips Where:
|
-r, --random <length> |
Generate a random string of the specified length. |
--rotate |
Perform password rotation for the secure keystore Note: This will restart CloudControl. |
--sandns |
Returns a list of DNS entries of the CloudControl appliance and protected resources to be added as SAN entries to certificates and certificate requests. |
--sanips |
Returns a list of IP addresses of the CloudControl appliance and protected resources to be added as SAN entries to certificates and certificate requests. |
-s, --service |
The service to apply the certificate to. Valid values are:
|
-t, --csrtool |
Runs the CSR tool which allows user to generate a CSR with SAN. |
-v, --verbose |
Enable verbose output. |
-vv |
Enable debug output. |
Examples
Import all certificates from CloudControl-protected hosts:
asc certs -b -y
List all certificates installed:
asc certs -l
List all certificate authority (CA) certificates:
asc certs -l -a
Validate and install a certificate for the CloudControl Management Console service:
asc certs -s gui --import /tmp/newCert.pem
Export the current key and certificate to files:
asc certs -k /foo/mykey.pem -c /foo/ssCert.pem
Delete the ca0025 service certificate authority certificate:
asc certs -a -d ca0025
Generate a 32 character random string:
asc certs -r 32
Imports the bundle of certificates:
asc certs -cabundle enable
Import the SSO signing keys:
asc certs -i /usr/local/asc/etc/ssosigncert.pem -s sso_signing
Enable FIPS mode:
asc certs --fipsmodeon
Discover the DNS entries that can be added as SAN entries:
asc certs --sandns
Discover the IP addresses that can be added as SAN entries:
asc certs --sanips