Provided by: freeipa-server_4.7.0~pre1+git20180411-2ubuntu2_amd64 bug

NAME

       ipa-cacert-manage - Manage CA certificates in IPA

SYNOPSIS

       ipa-cacert-manage [OPTIONS...] renew
       ipa-cacert-manage [OPTIONS...] install CERTFILE

DESCRIPTION

       ipa-cacert-manage can be used to manage CA certificates in IPA.

COMMANDS

       renew  - Renew the IPA CA certificate

              This  command  can  be  used  to  manually  renew  the  CA certificate of the IPA CA (NSS database
              nickname: "caSigningCert cert-pki-ca"). To renew other certificates, use getcert-resubmit(1).

              When the IPA CA is the root CA (the default), it is not usually necessary to manually renew the CA
              certificate, as it will be renewed automatically when it is about to expire, but you can do so  if
              you wish.

              When the IPA CA is subordinate of an external CA, the renewal process involves submitting a CSR to
              the  external  CA  and  installing  the  newly  issued  certificate  in  IPA, which cannot be done
              automatically. It is necessary to manually renew the CA certificate in this setup.

              When the IPA CA is not configured, this command is not available.

       install
              - Install a CA certificate

              This command can be used to install the certificate contained in  CERTFILE  as  an  additional  CA
              certificate to IPA.

              Important:  this  does not replace IPA CA but adds the provided certificate as a known CA. This is
              useful for instance when using  ipa-server-certinstall  to  replace  HTTP/LDAP  certificates  with
              third-party certificates signed by this additional CA.

              Please  do  not  forget  to run ipa-certupdate on the master, all the replicas and all the clients
              after this command in order to update IPA certificates databases.

COMMON OPTIONS

       --version
              Show the program's version and exit.

       -h, --help
              Show the help for this program.

       -p DM_PASSWORD, --password=DM_PASSWORD
              The Directory Manager password to use for authentication.

       -v, --verbose
              Print debugging information.

       -q, --quiet
              Output only errors.

       --log-file=FILE
              Log to the given file.

RENEW OPTIONS

       --self-signed
              Sign the renewed certificate by itself.

       --external-ca
              Sign the renewed certificate by external CA.

       --external-ca-type=TYPE
              Type of the external CA. Possible values are "generic", "ms-cs". Default value is  "generic".  Use
              "ms-cs"  to  include  the  template name required by Microsoft Certificate Services (MS CS) in the
              generated CSR (see --external-ca-profile for full details).

       --external-ca-profile=PROFILE_SPEC
              Specify the certificate profile or template to use at the external CA.

              When --external-ca-type is "ms-cs" the following specifiers may be used:

              <oid>:<majorVersion>[:<minorVersion>]
                     Specify a certificate template by OID and major version, optionally also  specifying  minor
                     version.

              <name> Specify  a  certificate  template  by  name.   The name cannot contain any : characters and
                     cannot be an OID (otherwise the OID-based template specifier syntax takes precedence).

              default
                     If no template is specified, the template name "SubCA" is used.

       --external-cert-file=FILE
              File containing the IPA CA certificate and the external CA certificate chain. The file is accepted
              in PEM and DER certificate and PKCS#7 certificate chain formats. This option may be used  multiple
              times.

INSTALL OPTIONS

       -n NICKNAME, --nickname=NICKNAME
              Nickname for the certificate.

       -t TRUST_FLAGS, --trust-flags=TRUST_FLAGS
              Trust  flags  for  the  certificate  in  certutil  format.  Trust flags are of the form "A,B,C" or
              "A,B,C,D" where A is for SSL, B is for S/MIME, C is for code signing, and D  is  for  PKINIT.  Use
              ",," for no explicit trust.

              The supported trust flags are:

                     C - CA trusted to issue server certificates

                     T - CA trusted to issue client certificates

                     p - not trusted

EXIT STATUS

       0 if the command was successful

       1 if an error occurred

SEE ALSO

       getcert-resubmit(1)

FreeIPA                                            Aug 12 2013                              ipa-cacert-manage(1)