Provided by: pki-server_10.6.0-1ubuntu2_amd64 bug

NAME

       pki-server-cert - Command-Line Interface for managing System Certificates.

SYNOPSIS

       pki-server [CLI options] cert
       pki-server [CLI options] cert-find
       pki-server [CLI options] cert-update <cert ID>
       pki-server [CLI options] cert-create <cert ID>
       pki-server [CLI options] cert-import <cert ID>

DESCRIPTION

       The   pki-server   cert   commands   provide  command-line  interfaces  to  manage  system
       certificates.

       pki-server cert commands perform system certificate related operations on  a  specific  CS
       instance.   All  pki-server cert commands require specification of the cert ID to identify
       the target certificate.

       pki-server [CLI options] cert
           This command is to list available cert commands.

       pki-server [CLI options] cert-find
           This command is to list all system certificates.

       pki-server [CLI options] cert-update <cert ID>
           This command is to update the system certificate data and  CSR  in  the  corresponding
           subsystem's CS.cfg.

       pki-server [CLI options] cert-create <cert ID>
           This command is to create a system certificate.

       pki-server [CLI options] cert-import <cert ID>
           This command is to imports certificate into NSS database and updates the corresponding
           subsystem's CS.cfg.

       To view each command's usage, type  pki-server cert-<command> --help.

       All pki-server commands must be executed as the system administrator.

OPTIONS

       The other CLI options are described in pki-server(8).

OFFLINE SYSTEM CERTIFICATE RENEWAL

       pki-server cert command is used as a part of offline system certificate renewal process.

       Assumptions:

           1. Valid CA signing cert

           2. Valid admin cert

           3. PKI server is currently down

       Steps for offline system certificate renewal:

           A. Run these commands to verify our assumptions:

               1. List details of all system certificates
                   pki-server cert-find

               2. Check details of admin cert
                   certutil -L \
                   -d <client NSS DB dir> \
                   -n <admin cert nickname>

               3. Check status of PKI server
                   systemctl status pki-tomcatd@pki-tomcat

           Note: Get the sslserver cert serial number from step #1 above to create permanent cert
           later. The admin needs to make a list of certs from step #1 that needs to be renewed.

           B. To bring up a PKI server that has expired SSL certificate:

               1. Create temp SSL certificate
                   pki-server cert-create sslserver --temp

               2.  Import  the  temp  SSL  certificate into NSS database and update corresponding
               subsystem's CS.cfg
                   pki-server cert-import sslserver

               3. Start PKI server using the new temp SSL cert created
                   systemctl restart pki-tomcatd@pki-tomcat

           C. To renew system certificates:

               1. The admin will need to create system certs, reported in step  #A1  above,  that
               are almost expired or already expired.
                   pki-server cert-create <cert ID> --renew \
                   -d <client NSS DB dir> \
                   -c <NSS DB password> \
                   -n <admin nickname>

               For SSL server certificate:
                   pki-server cert-create sslserver --renew \
                   --serial <old serial> \
                   -d <client NSS DB dir> \
                   -c <NSS DB password> \
                   -n <admin nickname>

               2. Stop the server to prevent NSS database corruption while importing:
                   systemctl stop pki-tomcatd@pki-tomcat

               3.   Import   the   renewed  system  certificate  into  NSS  database  and  update
               corresponding subsystem's CS.cfg
                   pki-server cert-import <cert ID>

               4. Start the server with renewed permanent system certificates
                   systemctl start pki-tomcatd@pki-tomcat

AUTHORS

       Dinesh Prasanth M K <dmoluguw@redhat.com>

COPYRIGHT

       Copyright (c) 2017 Red Hat, Inc. This is licensed under the GNU  General  Public  License,
       version 2 (GPLv2). A copy of this license is available at http://www.gnu.org/licenses/old-
       licenses/gpl-2.0.txt.