1 .TH "PKI \-\-ISSUE" 1 "2013-08-12" "@PACKAGE_VERSION@" "strongSwan"
5 pki \-\-issue \- Issue a certificate using a CA certificate and key
12 .BI \-\-cakey\~ file |\-\-cakeyid\~ hex
15 .OP \-\-san subjectAltName
17 .OP \-\-not-before datetime
18 .OP \-\-not-after datetime
23 .OP \-\-crl uri\ \fR[\fB\-\-crlissuer\ \fIissuer\fR]
26 .OP \-\-nc-permitted name
27 .OP \-\-nc-excluded name
28 .OP \-\-policy\-mapping mapping
29 .OP \-\-policy\-explicit len
30 .OP \-\-policy\-inhibit len
31 .OP \-\-policy\-any len
32 .OP \-\-cert\-policy oid\ \fR[\fB\-\-cps\-uri\ \fIuri\fR]\ \fR[\fB\-\-user\-notice\ \fItext\fR]
33 .OP \-\-outform encoding
38 .BI \-\-options\~ file
51 is used to issue a certificate using a CA certificate and private key.
57 Print usage information with a summary of the available options.
59 .BI "\-v, \-\-debug " level
60 Set debug level, default: 1.
62 .BI "\-+, \-\-options " file
63 Read command line options from \fIfile\fR.
65 .BI "\-i, \-\-in " file
66 Public key or PKCS#10 certificate request file to issue. If not given the
67 key/request is read from \fISTDIN\fR.
69 .BI "\-t, \-\-type " type
70 Type of the input. Either \fIpub\fR for a public key, or \fIpkcs10\fR for a
71 PKCS#10 certificate request, defaults to \fIpub\fR.
73 .BI "\-k, \-\-cakey " file
74 CA private key file. Either this or
78 .BI "\-x, \-\-cakeyid " hex
79 Key ID of a CA private key on a smartcard. Either this or
83 .BI "\-c, \-\-cacert " file
84 CA certificate file. Required.
86 .BI "\-d, \-\-dn " subject-dn
87 Subject distinguished name (DN) of the issued certificate.
89 .BI "\-a, \-\-san " subjectAltName
90 subjectAltName extension to include in certificate. Can be used multiple times.
92 .BI "\-l, \-\-lifetime " days
93 Days the certificate is valid, default: 1095. Ignored if both
94 an absolute start and end time are given.
96 .BI "\-F, \-\-not-before " datetime
97 Absolute time when the validity of the certificate begins. The datetime format
102 .BI "\-T, \-\-not-after " datetime
103 Absolute time when the validity of the certificate ends. The datetime format is
108 .BI "\-D, \-\-dateform " form
109 strptime(3) format for the
116 .BI "\-s, \-\-serial " hex
117 Serial number in hex. It is randomly allocated by default.
119 .BI "\-e, \-\-flag " flag
120 Add extendedKeyUsage flag. One of \fIserverAuth\fR, \fIclientAuth\fR,
121 \fIcrlSign\fR, or \fIocspSigning\fR. Can be used multiple times.
123 .BI "\-g, \-\-digest " digest
124 Digest to use for signature creation. One of \fImd5\fR, \fIsha1\fR,
125 \fIsha224\fR, \fIsha256\fR, \fIsha384\fR, or \fIsha512\fR. Defaults to
128 .BI "\-f, \-\-outform " encoding
129 Encoding of the created certificate file. Either \fIder\fR (ASN.1 DER) or
130 \fIpem\fR (Base64 PEM), defaults to \fIder\fR.
133 Include CA basicConstraint extension in certificate.
135 .BI "\-u, \-\-crl " uri
136 CRL distribution point URI to include in certificate. Can be used multiple
139 .BI "\-I, \-\-crlissuer " issuer
140 Optional CRL issuer for the CRL at the preceding distribution point.
142 .BI "\-o, \-\-ocsp " uri
143 OCSP AuthorityInfoAccess URI to include in certificate. Can be used multiple
146 .BI "\-p, \-\-pathlen " len
147 Set path length constraint.
149 .BI "\-n, \-\-nc-permitted " name
150 Add permitted NameConstraint extension to certificate. For DNS or email
151 constraints, the identity type is not always detectable by the given name. Use
156 prefix to force a constraint type.
158 .BI "\-N, \-\-nc-excluded " name
159 Add excluded NameConstraint extension to certificate. For DNS or email
160 constraints, the identity type is not always detectable by the given name. Use
165 prefix to force a constraint type.
167 .BI "\-M, \-\-policy-mapping " issuer-oid:subject-oid
168 Add policyMapping from issuer to subject OID.
170 .BI "\-E, \-\-policy-explicit " len
171 Add requireExplicitPolicy constraint.
173 .BI "\-H, \-\-policy-inhibit " len
174 Add inhibitPolicyMapping constraint.
176 .BI "\-A, \-\-policy-any " len
177 Add inhibitAnyPolicy constraint.
179 .SS "Certificate Policy"
180 Multiple certificatePolicy extensions can be added. Each with the following
183 .BI "\-P, \-\-cert-policy " oid
184 OID to include in certificatePolicy extension. Required.
186 .BI "\-C, \-\-cps-uri " uri
187 Certification Practice statement URI for certificatePolicy.
189 .BI "\-U, \-\-user-notice " text
190 User notice for certificatePolicy.
194 To save repetitive typing, command line options can be stored in files.
197 contains the following contents:
200 --cacert ca_cert.der --cakey ca_key.der --digest sha256
201 --flag serverAuth --lifetime 1460 --type pkcs10
204 Then the following command can be used to issue a certificate based on a
205 given PKCS#10 certificate request and the options above:
208 pki --issue --options pki.opt --in req.der > cert.der