sys crypto key
sys crypto key(1) BIG-IP TMSH Manual sys crypto key(1)
NAME
key - Manage cryptographic keys and related objects on the BIG-IP(r) system.
MODULE
sys crypto
SYNTAX
Manage cryptographic keys and related objects of the sys crypto module using the syntax in the following
section.
CREATE
create key [name]
options:
challenge-password [string]
admin-email-address [string]
city [string]
common-name [string]
consumer
[enterprise-manager | iquery | iquery-big3d | ltm | webserver]
country [string]
curve-name [prime256v1 | secp384r1 | secp521r1]
email-address [string]
key-size [512 | 1024 | 2048 | 4096]
key-type [dsa-private | ec-private | rsa-private]
lifetime [days]
organization [string]
ou [string]
passphrase [passphrase]
prompt-for-password
security-type [fips | normal | password | nethsm]
state [string]
subject-alternative-name [string]
cert-order-manager [add | delete | modify | replace-all-with] {
[ [name] ] {
options:
check-status [yes | no]
order-id [string | none]
order-passphrase [string | none]
order-type [cancel | new | renew | revoke]
revoke-reason [AACompromise | affiliationChanged | cessationOfOperation | removeFromCRL | unspecified | CACompromise | certificateHold |keyCompromise | privilegeWithdrawn | superseded]
}
}
MODIFY
modify key [name]
options
cert-order-manager [add | delete | modify | replace-all-with] {
[ [name] ] {
options:
check-status [yes | no]
order-id [string | none]
order-passphrase [string | none]
order-type [cancel | new | renew | revoke]
revoke-reason [AACompromise | affiliationChanged | cessationOfOperation | removeFromCRL | unspecified | CACompromise | certificateHold |keyCompromise | privilegeWithdrawn | superseded]
}
}
SHOW
show key
show key [name | none] cert-order-manager
LIST
list key
list key [name]
INSTALL
install key [name]
options:
consumer
[enterprise-manager | iquery | iquery-big3d | ltm | webserver]
from-editor
from-local-file [filename]
from-url [URL]
from-nethsm
no-overwrite
DELETE
delete key [name]
DESCRIPTION
You can use the key component to create, show, list, install, and delete cryptographic keys and associated
cryptographic objects. The file-objects created by these operations can be used in other BigIP configuration
blocks such as ssl profiles.
EXAMPLES
create key mykey
Generates a 2048-bit (default-sized) RSA key file object named "mykey.key". The appropriate extension will be
added to the generated key/cert if not already a part of the provided name.
create key mykey key-type ec-private curve-name prime256v1
Generates a prime256v1 curve name EC private key file object named "mykey.key". The appropriate extension will
be added to the generated key/cert if it is not already a part of the provided name.
create key /myfolder/mykey
Similar to the above action except it creates the key "mykey.key" in the folder "/myfolder" instead of the
default "/Common". The specified folder "/myfolder" must already exist in order for this operation to succeed.
create key example gen-cert gen-csr common-name "My Company Inc." country "US"
Generates a 2048-bit (default-sized) RSA key file object named "example.key" and a self signed certificate
named "example.crt". Also, a certificate signing request will be printed to the console for use in obtaining a
signed certificate from a certificate authority, if desired.
create key my gen-cert gen-csr prompt-for-password common-name "My Company Inc." country "US"
Similar to the above action when creating key "my.key" except it also prompts for a password to be used as a
challenge password in the certificate authority signing procedure.
create key server2 gen-cert gen-csr common-name "My Company Inc." country "US" consumer webserver
Generates a key and self signed certificate identified by server2. The consumer attribute, "webserver", is
used to cause these files to be placed directly in the paths which can be found by the BigIP's httpd.
create key server gen-csr common-name "My Company Inc." country "US" cert-order-manager add { certmgr {
order-type new } }
Generates a key and CSR identified by server. Associates cert-order-manager object "certmgr" with the key and
makes a "new" certificate order to the CA.
show key
Shows the number of keys installed in the system.
show key cert-order-manager
Shows certificate order statistics if a cert-order-manager object is associated with key.
list key example.key
Lists all details of the key named "example.key". A key with the specified name "example.key" in this case
must already be installed on the system in order for this operation to succeed.
list key
Lists all details of all keys installed in the system.
install key example from-editor
Opens an interactive editor session into which it a key for import into the BigIP system can be pasted. A key
file-object will be created with the name example which contains the contents saved from the editor session.
install key example from-local-file /tmp/example.key
Obtains a key from the file located at /tmp/example.key.
install key example from-url http://example.com/my.key
Obtains a key from a remote host that is based on the URI specified.
delete key example.key
Deletes the key "example.key" from the system.
OPTIONS
challenge-password
Specifies the challenge password to create the certificate request key.
admin-email-address
Specifies the administrator email-address to be used in creation of the certificate request associated
with the given key.
city Specifies the x509 city field to be used in creation of the certificate associated with the given key.
common-name
Specifies the x509 common-name to be used in creation of the certificate associated with the given key.
consumer
Specifies the system component by which a key and/or associated cryptographic file will be consumed. The
default behavior is to create file-objects for use by ltm components. This is the same as specifying
"ltm" for this property. If a component other than "ltm" is specified then files will be
installed/created into locations where the specified components can find them. For example, for component
"webserver", keys and certs will be placed in the webservers ssl directories.
country
Specifies the x509 country to be used in creation of the certificate associated with the given key. The
country must be a 2 letter country code.
curve-name
Specifies the curve name to be used in creation of the elliptic curve (EC) key. This option only applies
when generating EC keys. The default value is prime256v1.
email-address
Specifies the x509 email-address to be used in creation of the certificate associated with the given key.
from-editor
Specifies that the key should be obtained from a text editor session. This allows keys to be imported via
cut-n-paste from another location as long as they are in a text representation.
from-local-file
Specifies a local file path from which a key is to be copied.
from-url
Specifies a URI which is to be used to obtain a key for import into the configuration of the system.
The URL syntax is protocol dependent. Supported schemes are "HTTP", "HTTPS", "FTP", "FTPS" & "FILE."
from-nethsm
Specifies an option to import an existing key from network-HSM to BIG-IP config. The key label is
specified as the key name to identify the key to be imported from network-HSM.
no-overwrite
Specifies the option for not overwriting a key if it is in the scope.
gen-certificate
Specifies that in addition to generating a key, a self-signed certificate will also be created. If this
option is specified then x509 attributes should also be specified. Minimally, you must also specify a
common-name.
gen-csr
Specifies that a certificate signing request should be generated along with the key. The CSR will be
displayed to the terminal for the purposes of use in getting a certificate signed by an outside
authority. X509 attributes must also be specified.
key-size
Specifies the size, in bits, of the key to be generated. This option does not apply when generating EC
keys.
key-type
Specifies the type of cryptographic key to be generated. Default is rsa-private.
lifetime
Specifies the certificate life time to be used in creation of the certificate associated with the given
key.
organization
Specifies the x509 organization to be used in creation of the certificate associated with the given key.
ou Specifies the x509 organizational unit to be used in creation of the certificate associated with the
given key.
prompt-for-password
Specifies that a password should be prompted for and then used as a challenge password in generation of
the CSR (Certificate Signing Request).
security-type
Specifies the level of security used in storing the key in question. For example, a security-type of FIPS
means that the key should be stored on a FIPS card if one is available.
state
Specifies the x509 state or province of the certificate associated with the given key.
passphrase
Specifies an optional passphrase with which the key has been protected. It may be used by consumers of
the key in the data-plane or control-plane to decrypt it.
subject-alternative-name
Specifies standard X.509 extensions as shown in RFC 2459. Allowed values e.g. DNS:example.com,
IP:192.168.1.1, IP:12:34, email:user@example.com, URI:http://www.example.com
cert-order-manager
Specifies an optional cert-order-manager to be associated with the key.
check-status
Specifies that it checks the status of a certificate order. This command triggers an immediate status
check query with CA for a current pending certificate order.
order-id
Specifies the order id for a certificate order. This order id is provided by the CA and the bigip stores
it in the order-id field. Order id is required for certificate renewal and revoke. If the first
certificate was not orginally ordered from the bigip, the user needs to enter the order-id manually
before making a certificate renewal or revoke.
order-passphrase
Specifies the order challenge passphrase. This is a CA specific requirement. Some CA's require a
challenge passphrase for making a certificate order.
order-type
Specifies the type of certificate order to authority.
new : Make a new certificate order to the CA.
renew : Make a certificate renewal order to the CA.
revoke : Make a certificate revoke order to the CA.
cancel : Tries to cancel the previous certificate order.
revoke-reason
Specifies the reason for certificate revoke.
SEE ALSO
create, install, show, list, delete, tmsh
COPYRIGHT
No part of this program may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose
other than the purchaser's personal use, without the express written permission of F5 Networks, Inc.
F5 Networks and BIG-IP (c) Copyright 2009-2013, 2015-2018. All rights reserved.
BIG-IP 2018-07-18 sys crypto key(1)