Provided by: pki-tools_10.8.3-1ubuntu1_amd64
NAME
CMCEnroll - Used to sign a certificate request with an agent's certificate. Note: This tool has not yet been updated to work with the latest improvement in the CA to conform to RFC 5272. Please use CMCRequest instead.
SYNOPSIS
CMCEnroll -d NSS-database -n certificate-nickname -r certificate-request-file -p NSS-database-passwd
DESCRIPTION
The Certificate Management over Cryptographic Message Syntax (CMC) Enrollment utility, CMCEnroll, provides a command-line utility used to sign a certificate request with an agent's certificate. This can be used in conjunction with the CA end-entity CMC Enrollment form to sign and enroll certificates for users. CMCEnroll takes a standard PKCS #10 certificate request and signs it with an agent certificate. The output is also a certificate request which can be submitted through the appropriate profile.
OPTIONS
The following parameters are mandatory: Note: Surround values that include spaces with quotation marks. -d NSS-database The directory containing the NSS database associated with the agent certificate. This is usually the agent's personal directory, such as their browser certificate database in the home directory. -n certificate-nickname The nickname of the agent certificate that is used to sign the request. -r certificate-request-file The filename of the certificate request. -p NSS-database-passwd The password to the NSS certificate database which contains the agent certificate, given in -d NSS-database.
EXAMPLES
Signed requests must be submitted to the CA to be processed. Note: For this example to work automatically, the CMCAuth plug-in must be enabled on the CA server (which it is by default). (1) Create a PKCS #10 certificate request using a tool like certutil: $ cd $HOME/.mozilla/firefox/<profile> $ certutil -L -d . Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI Google Internet Authority G2 ,, COMODO RSA Domain Validation Secure Server CA ,, pki.example.com ,, DigiCert SHA2 Secure Server CA ,, DigiCert SHA2 Extended Validation Server CA ,, COMODO RSA Extended Validation Secure Server CA 2 ,, Symantec Class 3 Secure Server CA - G4 ,, Go Daddy Secure Certificate Authority - G2 ,, Oracle SSL CA - G2 ,, GeoTrust EV SSL CA - G4 ,, Symantec Class 3 Secure Server SHA256 SSL CA ,, GeoTrust SSL CA - G3 ,, PKI Administrator for example.com u,u,u DigiCert SHA2 High Assurance Server CA ,, COMODO RSA Organization Validation Secure Server CA ,, CA Signing Certificate - example.com Security Domain CT,C,C $ certutil -R -d . -s "CN=CMCEnroll Test Certificate" -a A random seed must be generated that will be used in the creation of your key. One of the easiest ways to create a random seed is to use the timing of keystrokes on a keyboard. To begin, type keys on the keyboard until this progress meter is full. DO NOT USE THE AUTOREPEAT FUNCTION ON YOUR KEYBOARD! Continue typing until the progress meter is full: |************************************************************| Finished. Press enter to continue: Generating key. This may take a few moments... Certificate request generated by Netscape certutil Phone: (not specified) Common Name: CMCEnroll Test Certificate Email: (not specified) Organization: (not specified) State: (not specified) Country: (not specified) -----BEGIN CERTIFICATE REQUEST----- MIICajCCAVICAQAwJTEjMCEGA1UEAxMaQ01DRW5yb2xsIFRlc3QgQ2VydGlmaWNh dGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDamQA6psK7Tnic3DAt IyAMCk7FK3PuSseJSrR/C7W05tPvrlp5vUKxpmcA+Pg3AANp5gVMQOps6riAvoK7 6NKTkw4Me09Cowad7ay9IBBY4QqqBmRnfT3Mm6U5tJWeqvq1cIkwoxzHllgsGBGM QduI7URjhQYx3p+srGSe0fM7bqK+AU6aJh4r0jc1A6pCv/2XMOY1IUzmjIEnNq2R WOpnsWQ4UDma1r8sUzKgNhkuhjPU5U5YGt9+0jiuqv14dbKi7UJN3DPtkEXZNOrF rGgqKhdUqLhrdm+x/Hgw/aZoSDFYXON9jFTFyMUyUkWXZq5sfwghWUC2q4DsbfvH 68h1AgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEAQ9aHQvPDcDuOJOL62pQeoDJp YtFmsDaksdhedG27usjPuX06XmzSIV3/D2zfPib2fpfdrHB5901TdehlghQVOkN6 sSoih60GSD9zCkFD1eESywJJeZssRfDG4gk2Ls9wXz5ZY/QwSx6C97SodF0cuDHL FsymesuxhePL7sYkkmazjgQTkA/JXLe6FYX213xQ+FGfQvmAqc9xHu5jvnBXX+Ub ucixaLKUiRIVHfTmuUb/qenEBQM2vzWDZawHL5SBSa/Zxjy2iVMrQBeOiLcu8bTL TAmSCbonRTilFrKFVG0H+Y9+5bulOdJc64XOvj9DRJd1FJoocw0eGhw31I5rJA== -----END CERTIFICATE REQUEST----- (2) Copy the PKCS #10 ASCII output to a text file. $ vi cert.req -----BEGIN CERTIFICATE REQUEST----- MIICajCCAVICAQAwJTEjMCEGA1UEAxMaQ01DRW5yb2xsIFRlc3QgQ2VydGlmaWNh dGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDamQA6psK7Tnic3DAt IyAMCk7FK3PuSseJSrR/C7W05tPvrlp5vUKxpmcA+Pg3AANp5gVMQOps6riAvoK7 6NKTkw4Me09Cowad7ay9IBBY4QqqBmRnfT3Mm6U5tJWeqvq1cIkwoxzHllgsGBGM QduI7URjhQYx3p+srGSe0fM7bqK+AU6aJh4r0jc1A6pCv/2XMOY1IUzmjIEnNq2R WOpnsWQ4UDma1r8sUzKgNhkuhjPU5U5YGt9+0jiuqv14dbKi7UJN3DPtkEXZNOrF rGgqKhdUqLhrdm+x/Hgw/aZoSDFYXON9jFTFyMUyUkWXZq5sfwghWUC2q4DsbfvH 68h1AgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEAQ9aHQvPDcDuOJOL62pQeoDJp YtFmsDaksdhedG27usjPuX06XmzSIV3/D2zfPib2fpfdrHB5901TdehlghQVOkN6 sSoih60GSD9zCkFD1eESywJJeZssRfDG4gk2Ls9wXz5ZY/QwSx6C97SodF0cuDHL FsymesuxhePL7sYkkmazjgQTkA/JXLe6FYX213xQ+FGfQvmAqc9xHu5jvnBXX+Ub ucixaLKUiRIVHfTmuUb/qenEBQM2vzWDZawHL5SBSa/Zxjy2iVMrQBeOiLcu8bTL TAmSCbonRTilFrKFVG0H+Y9+5bulOdJc64XOvj9DRJd1FJoocw0eGhw31I5rJA== -----END CERTIFICATE REQUEST----- (3) Run the CMCEnroll command to sign the certificate request. If the input file is "$HOME/.mozilla/firefox/<profile>/cert.req", the agent's certificate is stored in the "$HOME/.mozilla/firefox/<profile>" directory, the certificate common name for this CA is "PKI Administrator for example.com", and the password for the certificate database is "Secret.123", the command is as follows: $ CMCEnroll -d "$HOME/.mozilla/firefox/<profile>" \ -n "PKI Administrator for example.com" \ -r "$HOME/.mozilla/firefox/<profile>/cert.req" \ -p "Secret.123" cert/key prefix = path = <home>/.mozilla/firefox/<profile> -----BEGIN CERTIFICATE REQUEST----- MIICajCCAVICAQAwJTEjMCEGA1UEAxMaQ01DRW5yb2xsIFRlc3QgQ2VydGlmaWNh dGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDamQA6psK7Tnic3DAt IyAMCk7FK3PuSseJSrR/C7W05tPvrlp5vUKxpmcA+Pg3AANp5gVMQOps6riAvoK7 6NKTkw4Me09Cowad7ay9IBBY4QqqBmRnfT3Mm6U5tJWeqvq1cIkwoxzHllgsGBGM QduI7URjhQYx3p+srGSe0fM7bqK+AU6aJh4r0jc1A6pCv/2XMOY1IUzmjIEnNq2R WOpnsWQ4UDma1r8sUzKgNhkuhjPU5U5YGt9+0jiuqv14dbKi7UJN3DPtkEXZNOrF rGgqKhdUqLhrdm+x/Hgw/aZoSDFYXON9jFTFyMUyUkWXZq5sfwghWUC2q4DsbfvH 68h1AgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEAQ9aHQvPDcDuOJOL62pQeoDJp YtFmsDaksdhedG27usjPuX06XmzSIV3/D2zfPib2fpfdrHB5901TdehlghQVOkN6 sSoih60GSD9zCkFD1eESywJJeZssRfDG4gk2Ls9wXz5ZY/QwSx6C97SodF0cuDHL FsymesuxhePL7sYkkmazjgQTkA/JXLe6FYX213xQ+FGfQvmAqc9xHu5jvnBXX+Ub ucixaLKUiRIVHfTmuUb/qenEBQM2vzWDZawHL5SBSa/Zxjy2iVMrQBeOiLcu8bTL TAmSCbonRTilFrKFVG0H+Y9+5bulOdJc64XOvj9DRJd1FJoocw0eGhw31I5rJA== -----END CERTIFICATE REQUEST----- The output of this command is stored in a file with the same filename as the request with a .out appended to the filename (e.g. cert.req.out): $ cat cert.req.out -----BEGIN CERTIFICATE REQUEST----- MIIMhwYJKoZIhvcNAQcCoIIMeDCCDHQCAQMxCzAJBgUrDgMCGgUAMIIC6QYIKwYB BQUHDAKgggLbBIIC1zCCAtMwVDAvAgECBggrBgEFBQcHBjEgBB5Da2UvQ1V6VEZF Rzgwa1Ryb1dsNjVuTUZhMEU9DQowIQIBAwYIKwYBBQUHBwUxEgIQU05oqk+q+FdR go/eIzsjGTCCAnWgggJxAgEBMIICajCCAVICAQAwJTEjMCEGA1UEAxMaQ01DRW5y b2xsIFRlc3QgQ2VydGlmaWNhdGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQDamQA6psK7Tnic3DAtIyAMCk7FK3PuSseJSrR/C7W05tPvrlp5vUKxpmcA +Pg3AANp5gVMQOps6riAvoK76NKTkw4Me09Cowad7ay9IBBY4QqqBmRnfT3Mm6U5 tJWeqvq1cIkwoxzHllgsGBGMQduI7URjhQYx3p+srGSe0fM7bqK+AU6aJh4r0jc1 A6pCv/2XMOY1IUzmjIEnNq2RWOpnsWQ4UDma1r8sUzKgNhkuhjPU5U5YGt9+0jiu qv14dbKi7UJN3DPtkEXZNOrFrGgqKhdUqLhrdm+x/Hgw/aZoSDFYXON9jFTFyMUy UkWXZq5sfwghWUC2q4DsbfvH68h1AgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEA Q9aHQvPDcDuOJOL62pQeoDJpYtFmsDaksdhedG27usjPuX06XmzSIV3/D2zfPib2 fpfdrHB5901TdehlghQVOkN6sSoih60GSD9zCkFD1eESywJJeZssRfDG4gk2Ls9w Xz5ZY/QwSx6C97SodF0cuDHLFsymesuxhePL7sYkkmazjgQTkA/JXLe6FYX213xQ +FGfQvmAqc9xHu5jvnBXX+UbucixaLKUiRIVHfTmuUb/qenEBQM2vzWDZawHL5SB Sa/Zxjy2iVMrQBeOiLcu8bTLTAmSCbonRTilFrKFVG0H+Y9+5bulOdJc64XOvj9D RJd1FJoocw0eGhw31I5rJDAAMACggge1MIIDzDCCArSgAwIBAgIBATANBgkqhkiG 9w0BAQsFADBOMSswKQYDVQQKDCJ1c2Vyc3lzLnJlZGhhdC5jb20gU2VjdXJpdHkg RG9tYWluMR8wHQYDVQQDDBZDQSBTaWduaW5nIENlcnRpZmljYXRlMB4XDTE2MDcy MTIzNDAyNVoXDTM2MDcyMTIzNDAyNVowTjErMCkGA1UECgwidXNlcnN5cy5yZWRo YXQuY29tIFNlY3VyaXR5IERvbWFpbjEfMB0GA1UEAwwWQ0EgU2lnbmluZyBDZXJ0 aWZpY2F0ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKmWoikqOPpH 0JLW3SZ1SPojvndjdILqDuGuRmqtcLuzZtmNuY7ZVwrXt61G1SCCBoEiy/OcUCKM GVpw0M15Dn3sjJmd9F2R5lrGT2eMWWfVTr15RyEwK9Pn0mxTDN+0eZ4WDY9U4Zg4 2qZYIhkfGSTR5jhA4rs3uNOFm0ElLqDumGw3EXjJOy+RURvNbY4Pjlz89+Q2o6M0 /XMmMYzxVtXusKu1bvTKIiWoWCXR5ge78GoT/8reer+zxuSXiKSeVV2myvCQhmMH AD2rik/7hazuY2ztC8h9HF09PMSeK2ev6PlzSV/PEqj9u5bgOcbqeiQkzR6IOcSi JCn9o7B+AUMCAwEAAaOBtDCBsTAfBgNVHSMEGDAWgBS7NphdZcuI4IcjN29b96+L iuu6tTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBxjAdBgNVHQ4EFgQU uzaYXWXLiOCHIzdvW/evi4rrurUwTgYIKwYBBQUHAQEEQjBAMD4GCCsGAQUFBzAB hjJodHRwOi8vcGtpLWRlc2t0b3AudXNlcnN5cy5yZWRoYXQuY29tOjgwODAvY2Ev b2NzcDANBgkqhkiG9w0BAQsFAAOCAQEANUYLK65kV0na9zmtNGFje4akz4FBRAOh f/RYvtH4/0z38vW/E6fZkfb6CHrC4pNPfL6c0q/8H0mIrAft4kkQlTyJB9tdF5qY vCfUMmZ+zM664U/97nf7NSUu9PIFcNfh+/O9IoVUd7gEerRISJzbsmHAcCcfIiKX FsM+6HbEt+lH47flb/eSA2cUS84bC+XlZmKpse1R8PL/rKzngReZmMhNx73pYlEN 0qOpJILEMC1FVUExp6XnnP/m1+gY3T2FrIcUU7Jm1mCnln3VcLxkRU2c9tGj4xYr H8teMoQHLZTiqe/54h+3/pUEDgSATAHnex/uG33TXNDbpeNeq720eDCCA+EwggLJ oAMCAQICAQYwDQYJKoZIhvcNAQELBQAwTjErMCkGA1UECgwidXNlcnN5cy5yZWRo YXQuY29tIFNlY3VyaXR5IERvbWFpbjEfMB0GA1UEAwwWQ0EgU2lnbmluZyBDZXJ0 aWZpY2F0ZTAeFw0xNjA3MjEyMzQwMzBaFw0xODA3MTEyMzQwMzBaMHQxKzApBgNV BAoMInVzZXJzeXMucmVkaGF0LmNvbSBTZWN1cml0eSBEb21haW4xKTAnBgkqhkiG 9w0BCQEWGmNhYWRtaW5AdXNlcnN5cy5yZWRoYXQuY29tMRowGAYDVQQDDBFQS0kg QWRtaW5pc3RyYXRvcjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKPQ fOUyTIkdDnPzBrFRBknHqjYMrRpUDBR+JlarT/Sr6PqNQPMcM7JvgBNmXG32H+5w QH/sfVjOmKEJOMsh71vKiTM0wb5rIo08B34i9E5Cf2Wzx2/ht4qfWvSmb5ZBxy22 YpasKLdv7SwSDQr0U7h+Q/96Hgq85ONxWWN6XubgZxSfbs7QVcA0jVq+2inhT67B 0u4DO6MTxFJNCfDcWiA/M6xzKbjEqDUEh46Rk19krGPYsbfW2BMuOi7pyfTDJVJ5 CAUbo4bpR3eeo5KMbUvgF3WUxA1whOF2Oc6t0hdINW6Xeq3vpnwn3RyX2TRQ0zqi n3K3uPdahteQNcRb/Q8CAwEAAaOBozCBoDAfBgNVHSMEGDAWgBS7NphdZcuI4Icj N29b96+Liuu6tTBOBggrBgEFBQcBAQRCMEAwPgYIKwYBBQUHMAGGMmh0dHA6Ly9w a2ktZGVza3RvcC51c2Vyc3lzLnJlZGhhdC5jb206ODA4MC9jYS9vY3NwMA4GA1Ud DwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwQwDQYJKoZI hvcNAQELBQADggEBAADJNrg4qAZ1LxSz2Nn1k1SEmbugxrh8o1jpBAaSvLlv+blL +6wNq0D7c1GPzRO5TObyXgpbtHgofpKLSxw8cB3y8ugZMp7qJeCYxgzxQKEVMANW 6eZgAxvEe1J5Vyk/ELNiCtQmY7Mi+BtwvCF0xkCwYtOGlgeLV5t6GjBdG+jpZSIb B0En0+t/JOwvqUAhzVStz/j9LgBza0P8ACd/s2Z/zjpot2JTXDofF0mbiGwMz4Em /dOT3QhUr3QqFY/Q6T7c/wW7KbUXpNjwvLAV86A9Oojq32Z3ppJPnnDoLxLWvn8f 4rBdhhKrFhRZBYd91r3OExUIAEkFH9cmgPusjMsxggG6MIIBtgIBAzBTME4xKzAp BgNVBAoMInVzZXJzeXMucmVkaGF0LmNvbSBTZWN1cml0eSBEb21haW4xHzAdBgNV BAMMFkNBIFNpZ25pbmcgQ2VydGlmaWNhdGUCAQYwCQYFKw4DAhoFAKA+MBcGCSqG SIb3DQEJAzEKBggrBgEFBQcMAjAjBgkqhkiG9w0BCQQxFgQUeIRBuSA10uyZK8LB yc5Abz4f74AwDQYJKoZIhvcNAQEBBQAEggEAC1DFoKDcAzJUdIIucV61TqQtbBJT H8hhnln3+TwAO+u3X55o74xZMgawy/3Hkt3CjYxYmWIYY9MZILb2UeD0VZz63yzq F9tEZu2IhlvaOgP6NLcu8SxDImQ/GuvPIvGkGg0m/X3cwCHKymH7ZXAUfxQXgqbw CAMc+DH99xx0yotaAr5HE9tauNJejo4CDVYwUn/5syTcw3molt2Ely2FIFEyI3HD yPmP2OHw/xqlBhFvnoecbtpTq2DiWGPWJHSnzcdInuXudHHaIsribXK8HGw2MnCD 8Sq7UsrvBe50v0YebYzQdXYrsnluNc+Cwm2PdDQDfPT39e7iwGSLGi4KrQ== -----END CERTIFICATE REQUEST----- (4) Submit the signed certificate request through the CA end-entities page: (a) Open the end-entities page. (b) Select the "Signed CMC-Authenticated User Certificate Enrollment" profile. (c) Paste the content of the output file into the first text area of this form. (d) Remove the "-----BEGIN CERTIFICATE REQUEST-----" header and the "-----END CERTIFICATE REQUEST-----" footer from the pasted content. (e) Fill in the contact information, and submit the form. (5) The certificate is immediately processed and returned since a signed request was sent and the CMCAuth plug-in was enabled: Congratulations, your request has been processed successfully Your request ID is 7. Outputs * Certificate Pretty Print Certificate: Data: Version: v3 Serial Number: 0x7 Signature Algorithm: SHA256withRSA - 1.2.840.113549.1.1.11 Issuer: CN=CA Signing Certificate,O=example.com Security Domain Validity: Not Before: Thursday, July 21, 2016 6:28:20 PM MDT America/Denver Not After: Tuesday, January 17, 2017 6:28:20 PM MST America/Denver Subject: CN=CMCEnroll Test Certificate Subject Public Key Info: Algorithm: RSA - 1.2.840.113549.1.1.1 Public Key: Exponent: 65537 Public Key Modulus: (2048 bits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xtensions: Identifier: Authority Key Identifier - 2.5.29.35 Critical: no Key Identifier: BB:36:98:5D:65:CB:88:E0:87:23:37:6F:5B:F7:AF:8B: 8A:EB:BA:B5 Identifier: Authority Info Access: - 1.3.6.1.5.5.7.1.1 Critical: no Access Description: Method #0: ocsp Location #0: URIName: http://pki.example.com:8080/ca/ocsp Identifier: Key Usage: - 2.5.29.15 Critical: yes Key Usage: Digital Signature Non Repudiation Key Encipherment Identifier: Extended Key Usage: - 2.5.29.37 Critical: no Extended Key Usage: 1.3.6.1.5.5.7.3.2 1.3.6.1.5.5.7.3.4 Signature: Algorithm: SHA256withRSA - 1.2.840.113549.1.1.11 Signature: 6D:8B:99:D2:E9:D3:4E:7F:55:20:A6:7F:80:0C:72:B4: 30:C5:4F:CB:D4:AC:57:85:D7:D2:CA:75:90:F7:2F:57: 11:CB:67:16:08:0C:4C:23:D2:A5:A7:2E:4E:21:39:F5: D5:C7:6D:0B:DC:AD:48:E2:92:FF:99:C5:FC:CF:0E:89: 69:B9:09:BA:9F:0E:84:AB:81:32:A7:8B:99:30:DF:75: 2F:6C:61:5A:9C:87:77:DA:2C:EA:40:85:20:F2:DE:95: 76:6B:D7:0B:8C:88:25:62:00:2D:04:30:F0:24:4B:64: 2A:4A:E7:37:04:A2:BC:AD:B7:7F:BA:AA:74:41:2C:55: E9:E5:4B:92:18:BC:18:DC:FC:4B:EA:15:18:CE:B0:7A: 3A:84:64:E2:31:1C:64:0A:79:3E:80:6E:43:12:30:8A: 2A:67:6F:56:4B:56:55:C7:56:86:87:27:E4:C3:28:CA: 05:D2:BD:0B:5D:10:A2:4E:96:9D:5B:2A:A0:0B:9B:B6: BB:8F:15:1F:D3:AF:79:E0:38:D3:F1:ED:D5:F1:F0:EB: F8:66:56:3F:2F:4F:4A:93:0E:2E:11:F3:F7:1B:37:61: 08:E4:4A:92:4C:60:E3:1E:0A:0D:61:F2:AF:B2:E3:48: 39:74:AA:5E:32:5B:AB:F3:55:3B:6B:1B:33:48:CB:21 FingerPrint MD2: C2:58:80:9F:03:7D:5A:C2:3A:C2:42:D9:B8:CF:2D:17 MD5: 5F:D3:7C:1D:1F:59:3D:11:5E:B4:BE:75:D7:61:47:C6 SHA-1: F4:29:98:68:76:3F:41:FD:5E:E9:C3:F6:8A:3A:25:F3: 5C:A9:71:27 SHA-256: 66:8F:00:98:D4:FF:F1:E4:35:F2:8E:54:26:AD:98:02: 8F:6C:98:02:49:0B:A7:E5:98:41:1D:FE:92:E1:6A:57 SHA-512: E3:DB:3E:FB:9F:5F:CF:6D:79:1A:15:68:1A:42:5E:73: 9A:ED:15:98:1D:D9:31:AF:00:45:37:1E:8A:98:C1:EA: F0:DF:57:E9:A7:F7:19:01:5B:79:2B:79:07:CE:66:D6: D6:C3:42:C9:D5:EE:50:71:7D:A5:94:DF:25:E6:CC:49 * Certificate Base-64 Encoded -----BEGIN CERTIFICATE----- MIIDkjCCAnqgAwIBAgIBBzANBgkqhkiG9w0BAQsFADBOMSswKQYDVQQKDCJ1c2Vy c3lzLnJlZGhhdC5jb20gU2VjdXJpdHkgRG9tYWluMR8wHQYDVQQDDBZDQSBTaWdu aW5nIENlcnRpZmljYXRlMB4XDTE2MDcyMjAwMjgyMFoXDTE3MDExODAxMjgyMFow JTEjMCEGA1UEAxMaQ01DRW5yb2xsIFRlc3QgQ2VydGlmaWNhdGUwggEiMA0GCSqG SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDamQA6psK7Tnic3DAtIyAMCk7FK3PuSseJ SrR/C7W05tPvrlp5vUKxpmcA+Pg3AANp5gVMQOps6riAvoK76NKTkw4Me09Cowad 7ay9IBBY4QqqBmRnfT3Mm6U5tJWeqvq1cIkwoxzHllgsGBGMQduI7URjhQYx3p+s rGSe0fM7bqK+AU6aJh4r0jc1A6pCv/2XMOY1IUzmjIEnNq2RWOpnsWQ4UDma1r8s UzKgNhkuhjPU5U5YGt9+0jiuqv14dbKi7UJN3DPtkEXZNOrFrGgqKhdUqLhrdm+x /Hgw/aZoSDFYXON9jFTFyMUyUkWXZq5sfwghWUC2q4DsbfvH68h1AgMBAAGjgaMw gaAwHwYDVR0jBBgwFoAUuzaYXWXLiOCHIzdvW/evi4rrurUwTgYIKwYBBQUHAQEE QjBAMD4GCCsGAQUFBzABhjJodHRwOi8vcGtpLWRlc2t0b3AudXNlcnN5cy5yZWRo YXQuY29tOjgwODAvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBeAwHQYDVR0lBBYwFAYI KwYBBQUHAwIGCCsGAQUFBwMEMA0GCSqGSIb3DQEBCwUAA4IBAQBti5nS6dNOf1Ug pn+ADHK0MMVPy9SsV4XX0sp1kPcvVxHLZxYIDEwj0qWnLk4hOfXVx20L3K1I4pL/ mcX8zw6JabkJup8OhKuBMqeLmTDfdS9sYVqch3faLOpAhSDy3pV2a9cLjIglYgAt BDDwJEtkKkrnNwSivK23f7qqdEEsVenlS5IYvBjc/EvqFRjOsHo6hGTiMRxkCnk+ gG5DEjCKKmdvVktWVcdWhocn5MMoygXSvQtdEKJOlp1bKqALm7a7jxUf06954DjT 8e3V8fDr+GZWPy9PSpMOLhHz9xs3YQjkSpJMYOMeCg1h8q+y40g5dKpeMlur81U7 axszSMsh -----END CERTIFICATE----- * Certificate Imports ---------------------- | Import Certificate | ---------------------- (6) Use the agent page to search for the new certificate: Certificate 0x07 Certificate contents Certificate: Data: Version: v3 Serial Number: 0x7 Signature Algorithm: SHA256withRSA - 1.2.840.113549.1.1.11 Issuer: CN=CA Signing Certificate,O=example.com Security Domain Validity: Not Before: Thursday, July 21, 2016 6:28:20 PM MDT America/Denver Not After: Tuesday, January 17, 2017 6:28:20 PM MST America/Denver Subject: CN=CMCEnroll Test Certificate Subject Public Key Info: Algorithm: RSA - 1.2.840.113549.1.1.1 Public Key: Exponent: 65537 Public Key Modulus: (2048 bits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xtensions: Identifier: Authority Key Identifier - 2.5.29.35 Critical: no Key Identifier: BB:36:98:5D:65:CB:88:E0:87:23:37:6F:5B:F7:AF:8B: 8A:EB:BA:B5 Identifier: Authority Info Access: - 1.3.6.1.5.5.7.1.1 Critical: no Access Description: Method #0: ocsp Location #0: URIName: http://pki.example.com:8080/ca/ocsp Identifier: Key Usage: - 2.5.29.15 Critical: yes Key Usage: Digital Signature Non Repudiation Key Encipherment Identifier: Extended Key Usage: - 2.5.29.37 Critical: no Extended Key Usage: 1.3.6.1.5.5.7.3.2 1.3.6.1.5.5.7.3.4 Signature: Algorithm: SHA256withRSA - 1.2.840.113549.1.1.11 Signature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ingerPrint MD2: C2:58:80:9F:03:7D:5A:C2:3A:C2:42:D9:B8:CF:2D:17 MD5: 5F:D3:7C:1D:1F:59:3D:11:5E:B4:BE:75:D7:61:47:C6 SHA-1: F4:29:98:68:76:3F:41:FD:5E:E9:C3:F6:8A:3A:25:F3: 5C:A9:71:27 SHA-256: 66:8F:00:98:D4:FF:F1:E4:35:F2:8E:54:26:AD:98:02: 8F:6C:98:02:49:0B:A7:E5:98:41:1D:FE:92:E1:6A:57 SHA-512: E3:DB:3E:FB:9F:5F:CF:6D:79:1A:15:68:1A:42:5E:73: 9A:ED:15:98:1D:D9:31:AF:00:45:37:1E:8A:98:C1:EA: F0:DF:57:E9:A7:F7:19:01:5B:79:2B:79:07:CE:66:D6: D6:C3:42:C9:D5:EE:50:71:7D:A5:94:DF:25:E6:CC:49 Certificate request info Request ID: 7 Installing this certificate in a server The following format can be used to install this certificate into a server. Base 64 encoded certificate -----BEGIN CERTIFICATE----- MIIDkjCCAnqgAwIBAgIBBzANBgkqhkiG9w0BAQsFADBOMSswKQYDVQQKDCJ1c2Vy c3lzLnJlZGhhdC5jb20gU2VjdXJpdHkgRG9tYWluMR8wHQYDVQQDDBZDQSBTaWdu aW5nIENlcnRpZmljYXRlMB4XDTE2MDcyMjAwMjgyMFoXDTE3MDExODAxMjgyMFow JTEjMCEGA1UEAxMaQ01DRW5yb2xsIFRlc3QgQ2VydGlmaWNhdGUwggEiMA0GCSqG SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDamQA6psK7Tnic3DAtIyAMCk7FK3PuSseJ SrR/C7W05tPvrlp5vUKxpmcA+Pg3AANp5gVMQOps6riAvoK76NKTkw4Me09Cowad 7ay9IBBY4QqqBmRnfT3Mm6U5tJWeqvq1cIkwoxzHllgsGBGMQduI7URjhQYx3p+s rGSe0fM7bqK+AU6aJh4r0jc1A6pCv/2XMOY1IUzmjIEnNq2RWOpnsWQ4UDma1r8s UzKgNhkuhjPU5U5YGt9+0jiuqv14dbKi7UJN3DPtkEXZNOrFrGgqKhdUqLhrdm+x /Hgw/aZoSDFYXON9jFTFyMUyUkWXZq5sfwghWUC2q4DsbfvH68h1AgMBAAGjgaMw gaAwHwYDVR0jBBgwFoAUuzaYXWXLiOCHIzdvW/evi4rrurUwTgYIKwYBBQUHAQEE QjBAMD4GCCsGAQUFBzABhjJodHRwOi8vcGtpLWRlc2t0b3AudXNlcnN5cy5yZWRo YXQuY29tOjgwODAvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBeAwHQYDVR0lBBYwFAYI KwYBBQUHAwIGCCsGAQUFBwMEMA0GCSqGSIb3DQEBCwUAA4IBAQBti5nS6dNOf1Ug pn+ADHK0MMVPy9SsV4XX0sp1kPcvVxHLZxYIDEwj0qWnLk4hOfXVx20L3K1I4pL/ mcX8zw6JabkJup8OhKuBMqeLmTDfdS9sYVqch3faLOpAhSDy3pV2a9cLjIglYgAt BDDwJEtkKkrnNwSivK23f7qqdEEsVenlS5IYvBjc/EvqFRjOsHo6hGTiMRxkCnk+ gG5DEjCKKmdvVktWVcdWhocn5MMoygXSvQtdEKJOlp1bKqALm7a7jxUf06954DjT 8e3V8fDr+GZWPy9PSpMOLhHz9xs3YQjkSpJMYOMeCg1h8q+y40g5dKpeMlur81U7 axszSMsh -----END CERTIFICATE----- Base 64 encoded certificate with CA certificate chain in pkcs7 format -----BEGIN PKCS7----- MIIHlQYJKoZIhvcNAQcCoIIHhjCCB4ICAQExADAPBgkqhkiG9w0BBwGgAgQAoIIH ZjCCA5IwggJ6oAMCAQICAQcwDQYJKoZIhvcNAQELBQAwTjErMCkGA1UECgwidXNl cnN5cy5yZWRoYXQuY29tIFNlY3VyaXR5IERvbWFpbjEfMB0GA1UEAwwWQ0EgU2ln bmluZyBDZXJ0aWZpY2F0ZTAeFw0xNjA3MjIwMDI4MjBaFw0xNzAxMTgwMTI4MjBa MCUxIzAhBgNVBAMTGkNNQ0Vucm9sbCBUZXN0IENlcnRpZmljYXRlMIIBIjANBgkq hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2pkAOqbCu054nNwwLSMgDApOxStz7krH iUq0fwu1tObT765aeb1CsaZnAPj4NwADaeYFTEDqbOq4gL6Cu+jSk5MODHtPQqMG ne2svSAQWOEKqgZkZ309zJulObSVnqr6tXCJMKMcx5ZYLBgRjEHbiO1EY4UGMd6f rKxkntHzO26ivgFOmiYeK9I3NQOqQr/9lzDmNSFM5oyBJzatkVjqZ7FkOFA5mta/ LFMyoDYZLoYz1OVOWBrfftI4rqr9eHWyou1CTdwz7ZBF2TTqxaxoKioXVKi4a3Zv sfx4MP2maEgxWFzjfYxUxcjFMlJFl2aubH8IIVlAtquA7G37x+vIdQIDAQABo4Gj MIGgMB8GA1UdIwQYMBaAFLs2mF1ly4jghyM3b1v3r4uK67q1ME4GCCsGAQUFBwEB BEIwQDA+BggrBgEFBQcwAYYyaHR0cDovL3BraS1kZXNrdG9wLnVzZXJzeXMucmVk aGF0LmNvbTo4MDgwL2NhL29jc3AwDgYDVR0PAQH/BAQDAgXgMB0GA1UdJQQWMBQG CCsGAQUFBwMCBggrBgEFBQcDBDANBgkqhkiG9w0BAQsFAAOCAQEAbYuZ0unTTn9V IKZ/gAxytDDFT8vUrFeF19LKdZD3L1cRy2cWCAxMI9Klpy5OITn11cdtC9ytSOKS /5nF/M8OiWm5CbqfDoSrgTKni5kw33UvbGFanId32izqQIUg8t6VdmvXC4yIJWIA LQQw8CRLZCpK5zcEorytt3+6qnRBLFXp5UuSGLwY3PxL6hUYzrB6OoRk4jEcZAp5 PoBuQxIwiipnb1ZLVlXHVoaHJ+TDKMoF0r0LXRCiTpadWyqgC5u2u48VH9OveeA4 0/Ht1fHw6/hmVj8vT0qTDi4R8/cbN2EI5EqSTGDjHgoNYfKvsuNIOXSqXjJbq/NV O2sbM0jLITCCA8wwggK0oAMCAQICAQEwDQYJKoZIhvcNAQELBQAwTjErMCkGA1UE CgwidXNlcnN5cy5yZWRoYXQuY29tIFNlY3VyaXR5IERvbWFpbjEfMB0GA1UEAwwW Q0EgU2lnbmluZyBDZXJ0aWZpY2F0ZTAeFw0xNjA3MjEyMzQwMjVaFw0zNjA3MjEy MzQwMjVaME4xKzApBgNVBAoMInVzZXJzeXMucmVkaGF0LmNvbSBTZWN1cml0eSBE b21haW4xHzAdBgNVBAMMFkNBIFNpZ25pbmcgQ2VydGlmaWNhdGUwggEiMA0GCSqG SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCplqIpKjj6R9CS1t0mdUj6I753Y3SC6g7h rkZqrXC7s2bZjbmO2VcK17etRtUgggaBIsvznFAijBlacNDNeQ597IyZnfRdkeZa xk9njFln1U69eUchMCvT59JsUwzftHmeFg2PVOGYONqmWCIZHxkk0eY4QOK7N7jT hZtBJS6g7phsNxF4yTsvkVEbzW2OD45c/PfkNqOjNP1zJjGM8VbV7rCrtW70yiIl qFgl0eYHu/BqE//K3nq/s8bkl4iknlVdpsrwkIZjBwA9q4pP+4Ws7mNs7QvIfRxd PTzEnitnr+j5c0lfzxKo/buW4DnG6nokJM0eiDnEoiQp/aOwfgFDAgMBAAGjgbQw gbEwHwYDVR0jBBgwFoAUuzaYXWXLiOCHIzdvW/evi4rrurUwDwYDVR0TAQH/BAUw AwEB/zAOBgNVHQ8BAf8EBAMCAcYwHQYDVR0OBBYEFLs2mF1ly4jghyM3b1v3r4uK 67q1ME4GCCsGAQUFBwEBBEIwQDA+BggrBgEFBQcwAYYyaHR0cDovL3BraS1kZXNr dG9wLnVzZXJzeXMucmVkaGF0LmNvbTo4MDgwL2NhL29jc3AwDQYJKoZIhvcNAQEL BQADggEBADVGCyuuZFdJ2vc5rTRhY3uGpM+BQUQDoX/0WL7R+P9M9/L1vxOn2ZH2 +gh6wuKTT3y+nNKv/B9JiKwH7eJJEJU8iQfbXReamLwn1DJmfszOuuFP/e53+zUl LvTyBXDX4fvzvSKFVHe4BHq0SEic27JhwHAnHyIilxbDPuh2xLfpR+O35W/3kgNn FEvOGwvl5WZiqbHtUfDy/6ys54EXmZjITce96WJRDdKjqSSCxDAtRVVBMael55z/ 5tfoGN09hayHFFOyZtZgp5Z91XC8ZEVNnPbRo+MWKx/LXjKEBy2U4qnv+eIft/6V BA4EgEwB53sf7ht901zQ26XjXqu9tHgxAA== -----END PKCS7-----
SEE ALSO
CMCRequest(1), CMCResponse(1), CMCRevoke(1), pki(1)
AUTHORS
Matthew Harmsen <mharmsen@redhat.com>.
COPYRIGHT
Copyright (c) 2016 Red Hat, Inc. This is licensed under the GNU General Public License, version 2 (GPLv2). A copy of this license is available at ⟨http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt⟩.