12.4. Storing Certificates in NSS Databases


By default, certmonger uses .pem files to store the key and the certificate. To store the key and the certificate in an NSS database, specify the -d and -n with the command you use for requesting the certificate.
  • -d sets the security database location
  • -n gives the certificate nickname which is used for the certificate in the NSS database

Note

The -d and -n options are used instead of the -f and -k options that give the .pem file.
For example:
[root@server ~]# selfsign-getcert request -d /export/alias -n ServerCert ...
Requesting a certificate using ipa-getcert and local-getcert allows you to specify another two options:
  • -F gives the file where the certificate of the CA is to be stored.
  • -a gives the location of the NSS database where the certificate of the CA is to be stored.

Note

If you request a certificate using selfsign-getcert, there is no need to specify the -F and -a options because generating a self-signed certificate does not involve any CA.
Supplying the -F option, the -a option, or both with local-getcert allows you to obtain a copy of the CA certificate that is required in order to verify a certificate issued by the local signer. For example:
[root@server ~]# local-getcert request -F /etc/httpd/conf/ssl.crt/ca.crt -n ServerCert -f /etc/httpd/conf/ssl.crt/server.crt -k /etc/httpd/conf/ssl.key/server.key
Red Hat logoGithubRedditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.