Reference Guide

Example
Download server certicate:
racadm -r 192.168.0 -u root -p xxx sslcertdownload -t 1 -f cert.txt
Download Active Directory certicate:
racadm -r 192.168.0 -u root -p xxx sslcertdownload -t 2 -f ad_cert.txt
NOTE: This command is not supported in the rmware RACADM interface as it is not a le system.
sslcertupload
Description
Uploads a custom SSL server or CA certicate for Directory Service from the client to iDRAC.
To run this subcommand, you must have the Server Control privilege.
Synopsis
racadm sslcertupload -t <type> -f <filename> -p <passphrase> [-k <key file>]
Input
-t <type>Species the type of certicate to upload. The type of certicate must be:
1 — server certicate
2 — Active Directory
3 — Public Key Cryptography Standards (PKCS) format
-fSpecies the source lename in the local le system of the certicate uploaded.
-kSpecies optional source lename for private key when using type 6.
-p — Pass phrase for decrypting the PKCS12 le uploaded.
-k — Filename of the private key le while using type 6. The private key is generated when the CSR is
generated. If the CSR is generated on another server, then it is necessary to upload the private key with
the certicate.
Output
racadm -r 192.168.0.2 -u root -p xxx sslcertupload -t 2 -f cert.txt
Certicate successfully uploaded to the RAC.
Example
Uploading a server certicate.
racadm -r 192.168.0.2 -u root -p xxx sslcertupload -t 1 -f cert.txt
Upload web server certicate and key
racadm -r 192.168.0.2 -u root -p xxx sslcertupload -t 6 -f cert.txt -k
key.txt
Uploading Active Directory Certicate
racadm -r 192.168.0.2 -u root -p xxx sslcertupload -t 2 -f ad_cert.txt
sslcertview
Description
Displays the SSL server or CA certicate that exists on iDRAC.
Synopsis
racadm sslcertview -t <type> [-A]
Input
-tSpecies the type of certicate to view, either the CA certicate or server certicate.
1=server certicate
2=Active Directory
-A — Prevents printing headers or labels.
70