Questo contenuto non è disponibile nella lingua selezionata.
12.4. Storing Certificates in NSS Databases
By default,
certmonger uses .pem files to store the key and the certificate. To store the key and the certificate in an NSS database, specify the -d and -n with the command you use for requesting the certificate.
-dsets the security database location-ngives the certificate nickname which is used for the certificate in the NSS database
Note
The
-d and -n options are used instead of the -f and -k options that give the .pem file.
For example:
Copy to Clipboard
Copied!
Toggle word wrap
Toggle overflow
selfsign-getcert request -d /export/alias -n ServerCert ...
[root@server ~]# selfsign-getcert request -d /export/alias -n ServerCert ...
Requesting a certificate using
ipa-getcert and local-getcert allows you to specify another two options:
-Fgives the file where the certificate of the CA is to be stored.-agives the location of the NSS database where the certificate of the CA is to be stored.
Note
If you request a certificate using
selfsign-getcert, there is no need to specify the -F and -a options because generating a self-signed certificate does not involve any CA.
Supplying the
-F option, the -a option, or both with local-getcert allows you to obtain a copy of the CA certificate that is required in order to verify a certificate issued by the local signer. For example:
local-getcert request -F /etc/httpd/conf/ssl.crt/ca.crt -n ServerCert -f /etc/httpd/conf/ssl.crt/server.crt -k /etc/httpd/conf/ssl.key/server.key
[root@server ~]# local-getcert request -F /etc/httpd/conf/ssl.crt/ca.crt -n ServerCert -f /etc/httpd/conf/ssl.crt/server.crt -k /etc/httpd/conf/ssl.key/server.key