sys crypto csrΒΆ

sys crypto csr(1)				  BIG-IP TMSH Manual				    sys crypto csr(1)

NAME
       csr - Manage cryptographic certificate signing requests on the BIG-IP(r) system.

MODULE
       sys crypto

SYNTAX
       Manage cryptographic CSRs using the syntax in the following section.

   CREATE
	 create csr [name]
	   options:
	     challenge-password [string]
	     admin-email-address [string]
	     city [string]
	     common-name [string]
	     consumer
	       [enterprise-manager | iquery | iquery-big3d | ltm | webserver]
	     country [string]
	     email-address [string]
	     key [string]
	     organization [string]
	     ou [string]
	     state [string]
	     subject-alternative-name [string]

   SHOW
	 show csr

   LIST
	 list csr [name]

   DELETE
	 delete csr [name]

DESCRIPTION
       You can use the csr component to create, show, list and delete cryptographic certificate signing requests.

EXAMPLES
       create csr example key testkey.key common-name "My Company Inc." country "US" challenge-password "abcd"

       Generates a certificate signing request named "example.csr" with provided common-name, country and challenge-
       password attributes. A key with the specified name "testkey.key" in this case must be installed on the system
       in order for this operation to succeed. The csr extension (".csr") will be appended to the created csr name if
       it is not already provided in the name.

       create csr /myfolder/example key testkey.key common-name "My Company Inc." country "US" challenge-password
       "abcd"

       Similar to above, but creates the csr "example.csr" in the folder "/myfolder" instead of the default
       "/Common". The specified folder "/myfolder" must already exist in order for this operation to succeed.

       create csr server2 key server2.key common-name "My Company Inc." country "US" consumer webserver

       Generates a certificate signing request named "server2.csr". The consumer attribute, "webserver", is used to
       cause the files to be placed directly in the path which can be found by the BIG-IP system httpd. A pre-
       existing key named "server2.key" must exist in the web server's key path in order for this operation to
       succeed.

       show csr

       Shows the number of certificate signing requests installed in the system.

       list csr example.csr

       Lists all details of the certificate signing request "example.csr". A csr with the specified name
       "example.csr" in this case must already be installed on the system in order for this operation to succeed.
       Because only one certificate signing request name is specified in the list command, it will also display the
       contents of the certificate signing request file.

       list csr example1.csr example2.csr

       Lists all details of the certificate signing requests "example1.csr" and "example2.csr". Because more than one
       certificate signing request name is specified in the list command, it will not display the contents of the
       certificate signing request files.

       list csr

       Lists details of all certificate signing requests that are configured in the system. This command does not
       display the contents of the certificate signing request files.

       delete csr example.csr

       Deletes the certificate signing request "example.csr" from the system.

OPTIONS
       challenge-password
	    Specifies the PKCS#9 challenge-password field to be used in creation of the certificate signing request.

       admin-email-address
	    Specifies the administrator email-address to be used in creation of the certificate signing request.

       city Specifies the x509 city field to be used in creation of the certificate signing request.

       common-name
	    Specifies the x509 common-name to be used in creation of the certificate signing request.

       consumer
	    Specifies the system component by which a certificate signing request will be consumed. The default
	    behavior is to create file-objects for use by ltm components. This is the same as specifying "ltm" for
	    this property. If a component other than "ltm" is specified then files will be installed/created in
	    locations where the specified components can find them. For example, for component "webserver",
	    certificate signing requests will be placed in the webservers ssl directories.

       country
	    Specifies the x509 country to be used in creation of the certificate signing request. The country must be
	    a 2 letter country code.

       email-address
	    Specifies the x509 email-address to be used in creation of the certificate signing request.

       key  Specifies a key from which a certificate signing request should be generated when using the create
	    command.

       organization
	    Specifies the x509 organization to be used in creation of the certificate signing request.

       ou   Specifies the x509 organizational unit to be used in creation of the certificate signing request.

       state
	    Specifies the x509 state or province to be used in creation of the certificate signing request.

       subject-alternative-name
	    Specifies standard X.509 subject alternative extensions as shown in RFC 2459 to be used in creation of
	    the certificate signing request. Examples of allowed types are : DNS:example.com, IP:192.168.1.1,
	    IP:12:34, email:user@example.com, URI:http://www.example.com

SEE ALSO
       create, show, list, delete, tmsh

COPYRIGHT
       No part of this program may be reproduced or transmitted in any form or by any means, electronic or
       mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose
       other than the purchaser's personal use, without the express written permission of F5 Networks, Inc.

       F5 Networks and BIG-IP (c) Copyright 2013-2015. All rights reserved.

BIG-IP						      2016-07-20				    sys crypto csr(1)