cm keyΒΆ

cm key(1)		      BIG-IP TMSH Manual		     cm key(1)



NAME
       key - Manages a CM trust certificate private key file.

MODULE
       cm

SYNTAX
       Display or delete a key component within the cm module using the syntax
       shown in the following sections.

   DISPLAY
	list key
	list key [ [ [name] | [glob] | [regex] ] ... ]
	show running-config key
	show running-config key [ [ [name] | [glob] | [regex] ] ... ]
	 options:
	  all-properties
	  app-service
	  checksum
	  create-time
	  created-by
	  key-size
	  key-type
	  last-update-time
	  mode
	  non-default-properties
	  one-line
	  partition
	  recursive
	  revision
	  security-type
	  size
	  source-path
	  system-path
	  updated-by

   DELETE
	delete key [name]

DESCRIPTION
       You can use the following options with the key component.

OPTIONS
       app-service
	    Displays the application service to which the object belongs. The
	    default value is none. Note: If the strict-updates option is
	    enabled on the Application Service that owns the object, you
	    cannot modify or delete the object. Only the Application Service
	    can modify or delete the object.

       checksum
	    Displays a cryptographic hash or checksum of the key for use in
	    verification of key integrity.

       create-time
	    Displays the time at which the key was created.

       created-by
	    Displays the user who originally created the key.

       glob Displays the items that match the glob expression. See help glob
	    for a description of glob expression syntax.

       key-size
	    Displays the size of the cryptographic key, in bits.

       key-type
	    Displays the cryptographic algorithm that this key is compatible
	    with. A key can be one of two types:

	    rsa-private
		 The key is an RSA private key.

	    dsa-private
		 The key is a DSA based private key.

       last-update-time
	    Displays the time at which the key was last modified.

       mode Displays the UNIX file permissions mode for the file associated
	    with this key. The mode is expressed in numerical form.

       name Specifies the name of the key you want to delete.

       partition
	    Displays the partition within which the key resides.

       recursive
	    Displays all objects of the specified type and the folder that
	    contains the object.

       regex
	    Displays the items that match the regular expression. The regular
	    expression must be preceded by an at sign (@[regular expression])
	    to indicate that the identifier is a regular expression. See help
	    regex for a description of regular expression syntax.

       revision
	    Displays the latest revision of the key. The revision starts with
	    1 increments on each update.

       security-type
	    Displays the type of security used to handle or store the key.
	    There are four mutually exclusive options:

	    normal
		 Indicate the key resides in a standard form on the file-
		 system. This is the default security type.

	    fips Indicates that the key is protected by a FIPS device on the
		 system, and is only applicable to devices with FIPS support.

	    password
		 Indicates that the key is protected by a passphrase and
		 stored in encrypted form.

	    nethsm
		 Indicates that the key is protected by a FIPS device outside
		 the system.

       size Displays the size (in bytes) of the file associated with this file
	    object.

       source-path
	    Displays the location (URI) from where the file will be copied.

       system-path
	    Displays the location where the key is stored on the system.

       updated-by
	    Displays the name of the user who last updated the key.

SEE ALSO
       delete, glob, list, regex, tmsh

COPYRIGHT
       No part of this program may be reproduced or transmitted in any form or
       by any means, electronic or mechanical, including photocopying,
       recording, or information storage and retrieval systems, for any
       purpose other than the purchaser's personal use, without the express
       written permission of F5 Networks, Inc.

       F5 Networks and BIG-IP (c) Copyright 2008-2012. All rights reserved.



BIG-IP				  2018-03-29			     cm key(1)