Examples
Obtaining the CA Certificate
In the following example we first receive the CA certificate from
the CA server.
$ ssh-scepclient GET-CA \
-o ca1
http://pki.example.com:8080/scep/ \
test-ca1.ssh.com
Received CA/RA certificate ca1-0.ca:
fingerprint 9b:96:51:bb:29:0d:c9:e0:75:c8:03:0d:0d:92:60:6c
|
Enrolling a Certificate
Next, we enroll an RSA certificate. The user is authenticated to the CA
with the key secret
. The subject name and alternative IP address
are given, as well as key-usage flags.
$ ssh-scepclient ENROLL \
-P generate://pkcs8:ssh@rsa:1024/subject \
-C ca1-0.ca \
-p secret \
-s 'C=FI,O=SSH,CN=SCEP Example;IP=1.2.3.4' -u digitalsignature \
-o subject \
http://pki.example.com:8080/scep/
Received user certificate subject-0.crt:
fingerprint 4b:7e:d7:67:27:5e:e0:54:2f:5b:56:69:b5:01:d2:15
$ ls subject*
subject-0.crt subject.prv
|
Certificate Enrollment for Private Key Stored in SAF
This example shows a command for enrolling a certificate for a private
key that is stored in the user's key ring in SAF. The key provider and
the initialization string are given with the -Z
option. The URL
to the private key is given with the -P
option. The CA
certificate stored in file testca1.ca
is used. The subject name
is also given (CN=Testuser
). The user is authenticated to the
CA with the pre-shared key test
. The CA address is
pki.example.com
and the port 8080
$ ssh-scepclient ENROLL \
-Z "zos-saf:keys(ring(TESTUSER1))" \
-P "zos-saf://0/TESTUSER1/TEST/'TEST 1024 NON-ICSF'" \
-C testca1.ca \
-s 'CN=Testuser' \
-p test \
http://pki.example.com:8080/scep/
To get the value for the external key URL for the -P
option,
run ssh-ekview
on the key ring, for example:
ssh-ekview -i "keys(ring(TESTUSER1))" zos-saf
See ssh-ekview for more information.