Submitting Certificate Request with Key Archival - dogtagpki/pki GitHub Wiki
This page describes the process to generate and submit a CRMF request for key archival.
The following certificate profiles support key archival:
-
caUserCert
-
caECUserCert
-
caSigningUserCert
-
caDualCert
First, obtain KRA transport certificate (see Getting KRA Transport Certificate).
To generate and submit a new CRMF request:
$ CRMFPopClient \ -d ~/.dogtag/nssdb \ -p "" \ -m pki.example.com:8080 \ -f caUserCert \ -n UID=testuser \ -u testuser \ -b kra_transport.crt Submitting CRMF request to pki.example.com:8080 Request ID: 10 Request Status: pending Reason:
To generate and submit a new CRMF request:
$ pki client-cert-request \ --type crmf \ --profile caUserCert \ UID=testuser ----------------------------- Submitted certificate request ----------------------------- Request ID: 10 Type: enrollment Request Status: pending Operation Result: success
By default it will download the transport certificate from the CA. To use a transport certificate stored in a local file, specify --transport <filename>
. Either way, the transport certificate will be imported into the client’s NSS database.
To submit an existing CRMF request:
$ pki ca-cert-request-submit \ --request-type crmf \ --csr-file testuser.csr \ --profile caUserCert \ --subject UID=testuser ----------------------------- Submitted certificate request ----------------------------- Request ID: 0x9f727c2f06ee07568c6e7eada5755d8a Type: enrollment Request Status: pending Operation Result: success
Availability: Since PKI 11.7.