sys crypto keyΒΆ

sys crypto key(1)				  BIG-IP TMSH Manual				    sys crypto key(1)

NAME
       key - Manage cryptographic keys and related objects on the BIG-IP(r) system.

MODULE
       sys crypto

SYNTAX
       Manage cryptographic keys and related objects of the sys crypto module using the syntax in the following
       section.

   CREATE
	create key [name]
	 options:
	   challenge-password [string]
	   admin-email-address [string]
	   city [string]
	   common-name [string]
	   consumer
	     [enterprise-manager | iquery | iquery-big3d | ltm | webserver]
	   country [string]
	   curve-name [prime256v1 | secp384r1 | secp521r1]
	   email-address [string]
	   key-size [512 | 1024 | 2048 | 4096]
	   key-type [dsa-private | ec-private | rsa-private]
	   lifetime [days]
	   organization [string]
	   ou [string]
	   passphrase [passphrase]
	   prompt-for-password
	   security-type [fips | normal | password | nethsm]
	   state [string]
	   subject-alternative-name [string]
	   cert-order-manager [add | delete | modify | replace-all-with] {
	       [ [name] ] {
		 options:
		   check-status [yes | no]
		   order-id [string | none]
		   order-passphrase [string | none]
		   order-type [cancel | new | renew | revoke]
		   revoke-reason [AACompromise | affiliationChanged | cessationOfOperation | removeFromCRL | unspecified | CACompromise | certificateHold |keyCompromise | privilegeWithdrawn | superseded]
	       }
	   }

   MODIFY
	modify key [name]
	 options
	   cert-order-manager [add | delete | modify | replace-all-with] {
	       [ [name] ] {
		 options:
		   check-status [yes | no]
		   order-id [string | none]
		   order-passphrase [string | none]
		   order-type [cancel | new | renew | revoke]
		   revoke-reason [AACompromise | affiliationChanged | cessationOfOperation | removeFromCRL | unspecified | CACompromise | certificateHold |keyCompromise | privilegeWithdrawn | superseded]
	       }
	   }

   SHOW
	 show key
	 show key [name | none] cert-order-manager

   LIST
	 list key
	 list key [name]

   INSTALL
	 install key [name]
	   options:
	     consumer
	       [enterprise-manager | iquery | iquery-big3d | ltm | webserver]
	     from-editor
	     from-local-file [filename]
	     from-url [URL]
	     from-nethsm
	     no-overwrite

   DELETE
	 delete key [name]

DESCRIPTION
       You can use the key component to create, show, list, install, and delete cryptographic keys and associated
       cryptographic objects. The file-objects created by these operations can be used in other BigIP configuration
       blocks such as ssl profiles.

EXAMPLES
       create key mykey

       Generates a 2048-bit (default-sized) RSA key file object named "mykey.key". The appropriate extension will be
       added to the generated key/cert if not already a part of the provided name.

       create key mykey key-type ec-private curve-name prime256v1

       Generates a prime256v1 curve name EC private key file object named "mykey.key". The appropriate extension will
       be added to the generated key/cert if it is not already a part of the provided name.

       create key /myfolder/mykey

       Similar to the above action except it creates the key "mykey.key" in the folder "/myfolder" instead of the
       default "/Common". The specified folder "/myfolder" must already exist in order for this operation to succeed.

       create key example gen-cert gen-csr common-name "My Company Inc." country "US"

       Generates a 2048-bit (default-sized) RSA key file object named "example.key" and a self signed certificate
       named "example.crt". Also, a certificate signing request will be printed to the console for use in obtaining a
       signed certificate from a certificate authority, if desired.

       create key my gen-cert gen-csr prompt-for-password common-name "My Company Inc." country "US"

       Similar to the above action when creating key "my.key" except it also prompts for a password to be used as a
       challenge password in the certificate authority signing procedure.

       create key server2 gen-cert gen-csr common-name "My Company Inc." country "US" consumer webserver

       Generates a key and self signed certificate identified by server2. The consumer attribute, "webserver", is
       used to cause these files to be placed directly in the paths which can be found by the BigIP's httpd.

       create key server gen-csr common-name "My Company Inc." country "US"  cert-order-manager add { certmgr {
       order-type new } }

       Generates a key and CSR identified by server. Associates cert-order-manager object "certmgr" with the key and
       makes a "new" certificate order to the CA.

       show key

       Shows the number of keys installed in the system.

       show key cert-order-manager

       Shows certificate order statistics if a cert-order-manager object is associated with key.

       list key example.key

       Lists all details of the key named "example.key". A key with the specified name "example.key" in this case
       must already be installed on the system in order for this operation to succeed.

       list key

       Lists all details of all keys installed in the system.

       install key example from-editor

       Opens an interactive editor session into which it a key for import into the BigIP system can be pasted. A key
       file-object will be created with the name example which contains the contents saved from the editor session.

       install key example from-local-file /tmp/example.key

       Obtains a key from the file located at /tmp/example.key.

       install key example from-url http://example.com/my.key

       Obtains a key from a remote host that is based on the URI specified.

       delete key example.key

       Deletes the key "example.key" from the system.

OPTIONS
       challenge-password
	    Specifies the challenge password to create the certificate request key.

       admin-email-address
	    Specifies the administrator email-address to be used in creation of the certificate request associated
	    with the given key.

       city Specifies the x509 city field to be used in creation of the certificate associated with the given key.

       common-name
	    Specifies the x509 common-name to be used in creation of the certificate associated with the given key.

       consumer
	    Specifies the system component by which a key and/or associated cryptographic file will be consumed. The
	    default behavior is to create file-objects for use by ltm components. This is the same as specifying
	    "ltm" for this property. If a component other than "ltm" is specified then files will be
	    installed/created into locations where the specified components can find them. For example, for component
	    "webserver", keys and certs will be placed in the webservers ssl directories.

       country
	    Specifies the x509 country to be used in creation of the certificate associated with the given key. The
	    country must be a 2 letter country code.

       curve-name
	    Specifies the curve name to be used in creation of the elliptic curve (EC) key. This option only applies
	    when generating EC keys. The default value is prime256v1.

       email-address
	    Specifies the x509 email-address to be used in creation of the certificate associated with the given key.

       from-editor
	    Specifies that the key should be obtained from a text editor session. This allows keys to be imported via
	    cut-n-paste from another location as long as they are in a text representation.

       from-local-file
	    Specifies a local file path from which a key is to be copied.

       from-url
	    Specifies a URI which is to be used to obtain a key for import into the configuration of the system.

	    The URL syntax is protocol dependent. Supported schemes are "HTTP", "HTTPS", "FTP", "FTPS" & "FILE."

       from-nethsm
	    Specifies an option to import an existing key from network-HSM to BIG-IP config. The key label is
	    specified as the key name to identify the key to be imported from network-HSM.

       no-overwrite
	    Specifies the option for not overwriting a key if it is in the scope.

       gen-certificate
	    Specifies that in addition to generating a key, a self-signed certificate will also be created. If this
	    option is specified then x509 attributes should also be specified. Minimally, you must also specify a
	    common-name.

       gen-csr
	    Specifies that a certificate signing request should be generated along with the key. The CSR will be
	    displayed to the terminal for the purposes of use in getting a certificate signed by an outside
	    authority. X509 attributes must also be specified.

       key-size
	    Specifies the size, in bits, of the key to be generated. This option does not apply when generating EC
	    keys.

       key-type
	    Specifies the type of cryptographic key to be generated. Default is rsa-private.

       lifetime
	    Specifies the certificate life time to be used in creation of the certificate associated with the given
	    key.

       organization
	    Specifies the x509 organization to be used in creation of the certificate associated with the given key.

       ou   Specifies the x509 organizational unit to be used in creation of the certificate associated with the
	    given key.

       prompt-for-password
	    Specifies that a password should be prompted for and then used as a challenge password in generation of
	    the CSR (Certificate Signing Request).

       security-type
	    Specifies the level of security used in storing the key in question. For example, a security-type of FIPS
	    means that the key should be stored on a FIPS card if one is available.

       state
	    Specifies the x509 state or province of the certificate associated with the given key.

       passphrase
	    Specifies an optional passphrase with which the key has been protected. It may be used by consumers of
	    the key in the data-plane or control-plane to decrypt it.

       subject-alternative-name
	    Specifies standard X.509 extensions as shown in RFC 2459. Allowed values e.g. DNS:example.com,
	    IP:192.168.1.1, IP:12:34, email:user@example.com, URI:http://www.example.com

       cert-order-manager
	    Specifies an optional cert-order-manager to be associated with the key.

       check-status
	    Specifies that it checks the status of a certificate order. This command triggers an immediate status
	    check query with CA for a current pending certificate order.

       order-id
	    Specifies the order id for a certificate order. This order id is provided by the CA and the bigip stores
	    it in the order-id field. Order id is required for certificate renewal and revoke.	If the first
	    certificate was not orginally ordered from the bigip, the user needs to enter the order-id manually
	    before making a certificate renewal or revoke.

       order-passphrase
	    Specifies the order challenge passphrase. This is a CA specific requirement. Some CA's require a
	    challenge passphrase for making a certificate order.

       order-type
	    Specifies the type of certificate order to authority.

	    new : Make a new certificate order to the CA.

	    renew : Make a certificate renewal order to the CA.

	    revoke : Make a certificate revoke order to the CA.

	    cancel : Tries to cancel the previous certificate order.

       revoke-reason
	    Specifies the reason for certificate revoke.

SEE ALSO
       create, install, show, list, delete, tmsh

COPYRIGHT
       No part of this program may be reproduced or transmitted in any form or by any means, electronic or
       mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose
       other than the purchaser's personal use, without the express written permission of F5 Networks, Inc.

       F5 Networks and BIG-IP (c) Copyright 2009-2013, 2015-2018. All rights reserved.

BIG-IP						      2018-07-18				    sys crypto key(1)