Brocade Fabric OS Command Reference Guide v6.1.0 (53-1000599-02, June 2008)

Table Of Contents
558 Fabric OS Command Reference
53-1000599-02
secCertUtil
2
secCertUtil
Manages certificates on a switch.
Synopsis seccertutil
seccertutil genkey [-nowarn] [-keysize 1024 | 2048]
seccertutil delkey [-nowarn]
seccertutil gencsr [-country country code] [-state state] [-locality locality] [ -org organization]
[-orgunit organization unit] [-cn common name]
seccertutil delcsr [-nowarn]
seccertutil showcsr
seccertutil delete [-ldapcacert] file name [-nowarn]
seccertutil export [-ldapcacert] [-certname certificate name]] [-protocol ftp | scp] [-ipaddr IP
address] [-remotedir remote directory ] [-login login name] [-password password]
seccertutil import [-ldapcacert] | [-config cacert] | [-config swcert [-enable https]] [-protocol ftp |
scp] [-ipaddr IP address] [-remotedir remote directory ] [-certname
certificate name] [-login login
name] [-password password]
seccertutil show [-ldapcacert] | [file name]
Description Use this command to manage third-party certificates on a switch, including Public Key
Infrastructure (PKI) based certificates and Lightweight Directory Access Protocol (LDAP)
certificates. This command also imports or exports Certificate Signing Requests (CSRs) from or to a
remote host. This command supports IPV4 and IPV6 addresses.
Use this command to do the following:
Generate a public/private key pair.
Delete a public/private key pair.
Generate a CSR.
Delete a CSR.
List existing certificates on a switch.
Display the contents of a certificate or CSR.
Delete a specified certificate.
Import or export a certificate.
Configure a SSL certificate file name.
Enable secure protocols.
This command takes an action and associated arguments. If only an action is specified, this
command prompts interactively for input values of the associated arguments. The command runs
non-interactively when the arguments associated with a given action are specified on the
command line. When invoked without operands, this command displays the usage.
Note The execution of this command is subject to Admin Domain restrictions that may be in place. Refer
to chapter 1, "Understanding Admin Domain Restrictions" and Appendix A, "Command Availability"
for details.