Provided by: certmonger_0.79.14+git20211010-2ubuntu1_amd64 bug

NAME

       dogtag-ipa-renew-agent-submit

SYNOPSIS

       dogtag-ipa-renew-agent-submit [options] [csrfile]

DESCRIPTION

       dogtag-ipa-renew-agent-submit is the helper which certmonger uses to make certificate renewal requests to
       Dogtag instances running on IPA servers.  It is not  normally  run  interactively,  but  it  can  be  for
       troubleshooting purposes.

       The  preferred  option is to request a renewal of an already-issued certificate, using its serial number,
       which can be read from a PEM-formatted certificate provided  in  the  CERTMONGER_CERTIFICATE  environment
       variable,  or  via  the  -s  or -D option on the command line.  If no serial number is provided, then the
       client will attempt to obtain a new certificate by submitting a signing request to the CA.

       The signing request which is to be submitted should either be in  a  file  whose  name  is  given  as  an
       argument, or fed into dogtag-ipa-renew-agent-submit via stdin.

       certmonger does not yet support retrieving trust information from Dogtag CAs.

OPTIONS

       -E EE-URL, --ee-url=EE-URL
              The  top-level URL for the end-entity interface provided by the CA.  In IPA installations, this is
              typically http://SERVER:EEPORT/ca/ee/ca.  If no URL is specified, the host named in  the  [global]
              section  in the /etc/ipa/default.conf file is used as the value of SERVER, and the value of EEPORT
              will be inferred based on the  value  of  the  dogtag_version  in  the  [global]  section  in  the
              /etc/ipa/default.conf  file:  if  dogtag_version is set to 10 or more, EEPORT will be set to 8080.
              Otherwise it will be 9180.

       -A AGENT-URL, --agent-url=AGENT-URL
              The top-level URL for the agent interface provided by the  CA.   In  IPA  installations,  this  is
              typically  https://SERVER:AGENTPORT/ca/agent/ca.   If  no  URL is specified, the host named in the
              [global] section in the /etc/ipa/default.conf file is used as the value of SERVER, and  the  value
              of  AGENTPORT will be inferred based on the value of the dogtag_version in the [global] section in
              the /etc/ipa/default.conf file: if dogtag_version is set to 10 or more, AGENTPORT will be  set  to
              8443.  Otherwise it will be 9443.

       -i FILE, --cafile=PATH
              The  location  of  a file containing a copy of the CA's certificate, against which the CA server's
              certificate will be verified. The default is /etc/ipa/ca.crt.

       -C DIR, --capath=DIR
              The location of a directory containing a copy of  the  CA's  certificate,  against  which  the  CA
              server's certificate will be verified.

       -d DIR, --dbdir=DIR
              The NSS database that contains credentials to authenticate to the CA.

       -n NAME, --nickname=NAME
              The nickname of the certificate used for authentication.

       -c FILENAME, --certfile=FILENAME
              The certificate in PEM format used for authentication.

       -k FILENAME, --keyfile=FILENAME
              The private key for the certificate in PEM format used for authentication. It may be encrypted.

       -p FILENAME, --sslpinfile=FILENAME
              A file that contains the pin for the private key file or NSS database.

       -P STRING, --sslpin=STRING
              The pin for the private key file or NSS database.

       -s NUMBER, --hex-serial=NUMBER
              The serial number of an already-issued certificate for which the client should attempt to obtain a
              new certificate, in hexidecimal form, if one can  not  be  read  from  the  CERTMONGER_CERTIFICATE
              environment variable.

       -D NUMBER, --serial=NUMBER
              The serial number of an already-issued certificate for which the client should attempt to obtain a
              new certificate, in decimal  form,  if  one  can  not  be  read  from  the  CERTMONGER_CERTIFICATE
              environment variable.

       -S STATE-VALUE, --state=STATE-VALUE
              A  cookie  value  provided  by a previous instance of this helper, if the helper is being asked to
              continue a multi-step enrollment process.  If the CERTMONGER_COOKIE environment variable  is  set,
              its value is used.

       -T NAME, --profile=NAME
              The  name  of  the  type  of  certificate which the client should request from the CA if it is not
              renewing a certificate (per the  -s  option  above).   If  the  CERTMONGER_CA_PROFILE  environment
              variable is set, its value is used.  Otherwise, the default value is caServerCert.

       -t, --profile-list
              Instead  of  attempting  to  obtain  a new certificate, query the server for a list of the enabled
              enrollment profiles.

       -O param=value, --approval-option=param=value
              An additional parameter to pass to the server when approving the signing request using the agent's
              credentials.   By  default,  any server-supplied default settings are applied.  This option can be
              used either to override a server-supplied default setting, or to supply one which would  otherwise
              have not been used.

       -N, --force-new
              Even  if  an  already-issued  certificate  is  available in the CERTMONGER_CERTIFICATE environment
              variable, or a serial number has been provided, don't attempt to renew  a  certificate  using  its
              serial  number.   Instead,  attempt  to  obtain  a new certificate using the signing request.  The
              default behavior is to request a renewal if possible.

       -R, --force-renew
              Negates the effect of the -N flag.

       -o param=value, --submit-option=param=value
              When initially submitting a request to the CA, add the specified parameter and  value  along  with
              any request parameters which would otherwise be sent.  This option is not typically used.

       -a, --agent-submit
              Use  agent  credentials,  specified  using  some  combination  of the -d, -n, -c, and -k flags, to
              authenticate to the CA when initially submitting a request to the CA or  retrieving  the  list  of
              enabled  enrollment  profiles.   This is typically required when the enrollment profile being used
              uses AgentCertAuth-based authentication, and requires that the URL specified using the -E flag  be
              an HTTPS URL, or when the URL specified using the -E flag is an HTTPS URL.

       -u username, --uid=username
              When initially submitting a request to the CA, supply the specified value as a user name.  This is
              typically  required  when  the  enrollment  profile  being  used   uses   UidPwdDirAuth-based   or
              NISAuth-based  authentication..TP  -U  userdn, --upn=userdn When initially submitting a request to
              the CA, supply the specified value as the DN  (distinguished  name)  of  the  user's  entry  in  a
              directory  server  which  the  CA  is configured to use for checking the user's password.  This is
              typically required when the enrollment profile being used uses UdnPwdDirAuth-based authentication.

       -W PASSWORD, --userpwd=PASSWORD
              When initially submitting a request to the CA, supply the specified value as the password for  the
              user  whose  name  is  specified  with the -u option, or whose DN is specified with the -U option.
              This is typically only required when the enrollment profile being used  uses  UidPwdDirAuth-based,
              UserPwdDirAuth-based,  or NISAuth-based authentication.  If the URL specified using the -E flag is
              not an HTTPS URL, this value will not be encrypted.

       -w FILE, --userpwdfile=FILE
              When initially submitting a request to the CA, read from the specified file a password  to  supply
              for  the  user  whose  name  is specified with the -u option, or whose DN is specified with the -U
              option.   This  is  typically  only  required  when  the  enrollment  profile  being   used   uses
              UidPwdDirAuth-based,  UserPwdDirAuth-based, or NISAuth-based authentication.  If the URL specified
              using the -E flag is not an HTTPS URL, this value will not be encrypted.

       -Y PIN, --userpin=PIN
              When initially submitting a request to the CA, supply the specified value as the PIN for the  user
              whose  name is specified with the -u option, or whose DN is specified with the -U option.  This is
              typically only required  when  the  enrollment  profile  being  used  uses  UidPwdPinDirAuth-based
              authentication.   If  the URL specified using the -E flag is not an HTTPS URL, this value will not
              be encrypted.  -y FILE, --userpinfile=FILE When initially submitting a request  to  the  CA,  read
              from  the  specified file a PIN to supply for the user whose name is specified with the -u option,
              or whose DN is specified with the -U option.  This is typically only required when the  enrollment
              profile  being used uses UidPwdPinDirAuth-based authentication.  If the URL specified using the -E
              flag is not an HTTPS URL, this value will not be encrypted.

       -v, --verbose
              Increases the logging level.  Use twice for more  logging.   This  option  is  mainly  useful  for
              troubleshooting.

AGENT KEY AND CERTIFICATE OPTIONS

       Options  that provide the location for the private key and public certificate which the client should use
       to authenticate to the CA's agent interface.  The values to use depend on which cryptography library your
       copy of libcurl was linked with.

       The  location  of  the  certificate  used  for  authentication to the CA needs to be provided in either a
       combination of PEM files using --certfile and --keyfile or an NSS database using--dbdir  and  --nickname.
       The default for --cafile is /etc/ipa/ca.crt.

       -d dbdir, --dbdir=dbdir
              Use an NSS database in the specified directory for this certificate and key. Only valid with -n.

       -n NAME, --nickname=NAME
              Use the NSS key with this nickname. Only valid with -d.

       -c FILE, --certfile=FILE
              The PEM file that contains the public certificate. Only valid with -k.

       -k FILE, --keyfile=FILE
              The PEM file that contains the private certificate. Only valid with -c.

       -p FILE, --sslpinfile=FILE
              The  name of a file which contains a PIN/password which will be needed in order to make use of the
              agent credentials.

       -P PIN, --sslpin=PIN
              The name of a file which contains a PIN/password which will be needed in order to make use of  the
              agent credentials.

EXIT STATUS

       0      if the certificate was issued. The certificate will be printed.

       1      if the CA is still thinking.  A cookie (state) value will be printed.

       2      if the CA rejected the request.  An error message may be printed.

       3      if the CA was unreachable.  An error message may be printed.

       4      if critical configuration information is missing.  An error message may be printed.

       5      if  the  CA is still thinking.  A suggested poll delay (specified in seconds) and a cookie (state)
              value will be printed.

       17     if the CA indicates that the client needs to attempt enrollment using a new key pair.

FILES

       /etc/ipa/default.conf
              is the IPA client configuration file.  This file is consulted to determine the URL for the  Dogtag
              server's end-entity and agent interfaces if they are not supplied as arguments.

BUGS

       Please file tickets for any that you find at https://fedorahosted.org/certmonger/

SEE ALSO

       certmonger(8)  getcert(1)  getcert-add-ca(1)  getcert-add-scep-ca(1)  getcert-list-cas(1) getcert-list(1)
       getcert-modify-ca(1)  getcert-refresh-ca(1)  getcert-refresh(1)   getcert-rekey(1)   getcert-remove-ca(1)
       getcert-resubmit(1)       getcert-start-tracking(1)       getcert-status(1)      getcert-stop-tracking(1)
       certmonger-certmaster-submit(8)           certmonger-dogtag-submit(8)            certmonger-ipa-submit(8)
       certmonger-local-submit(8) certmonger-scep-submit(8) certmonger_selinux(8)