WAS v8.5 > Reference > Commands (wsadmin scripting)

CertificateRequestCommands command group of AdminTask

We can use the Jython or Jacl scripting languages to configure security with wsadmin. The commands and parameters in the CertificateRequestCommands group can be used to create and manage certificate requests.

The CertificateRequestCommands command group for the AdminTask object includes the following commands:


createCertificateRequest

The createCertificateRequest command creates a certificate request associated with a particular key store.

Target object None.

Parameters and return values

-keyStoreName

The name that uniquely identifies the key store configuration object. (String, required)

-keyStoreScope

The scope name of the key store. (String, optional)

-certificateAlias

The name that uniquely identifies the certificate request in a key store. (String, required)

-certificateVersion

The certificate version. (String, required)

-certificateSize

(Integer, required)

-certificateCommonName

(String, required)

-certificateOrganization

(String, optional)

-certificateOrganizationalUnit

(String, optional)

-certificateLocality

(String, optional)

-certificateState

The state code for the certificate. (String, optional)

-certificateZip

The zip code for the certificate. (String, optional)

-certificateCountry

The country for the certificate. (String, optional)

-certificateValidDays

The amount of time in days for which the certificate is valid. (Integer, optional)

-certificateRequestFilePath

The file location of the certificate request that can be sent to a certificate authority. (String, required)

-signatureAlgorithem

The signature algorithm used to create the self-signed certificate. The list of valid signature algorithms can be retrieved using the listSignatureAlgorithms command. (String, optional)

Examples

Batch mode example usage:

Interactive mode example usage:


deleteCertificateRequest

The deleteCertificateRequest command deletes a certificate request from a key store.

Target object None.

Parameters and return values

-keyStoreName

The name that uniquely identifies the key store configuration object. (String, required)

-keyStoreScope

The scope name of the key store. (String, optional)

-certificateAlias

The name that uniquely identifies the certificate request in a key store. (String, required)

Examples

Batch mode example usage:

Interactive mode example usage:


extractCertificateRequest

The extractCertificateRequestcommand extracts a certificate request to a file.

Target object None.

Parameters and return values

-keyStoreName

The name that uniquely identifies the key store configuration object. (String, required)

-keyStoreScope

The scope name of the key store. (String, optional)

-certificateAlias

The name that uniquely identifies the certificate request in a key store. (String, required)

-certificateRequestFilePath

The file location of the certificate request that can be sent to a certificate authority. (String, required)

Optional parameters

-signatureAlgorithem

The signature algorithm used to create the self-signed certificate. The list of valid signature algorithms can be retrieved using the listSignatureAlgorithms command. (String, optional)

Elliptical Curve signature algorithms require specific sizes, so the size parameter is ignored if SHA256withECDSA, SHA384withECDSA, or SHA512withECDSA is specified. SHA256withECDSA will have a size of 256, SHA384withECDSA will have a size of 384, and SHA512withECDSA will have a size of 521.

Examples

Batch mode example usage:

Interactive mode example usage:


getCertificateRequest

The getCertificateRequest command obtains information about a particular certificate request in a key store.

Target object None.

Parameters and return values

-keyStoreName

The name that uniquely identifies the key store configuration object. (String, required)

-keyStoreScope

The scope name of the key store. (String, optional)

-certificateAlias

The name that uniquely identifies the certificate request in a key store. (String, required)

Examples

Batch mode example usage:

Interactive mode example usage:


listCertificateRequests

The listCertificateRequests command lists all the certificate requests associated with a particular key store.

Target object None.

Parameters and return values

-keyStoreName

The name that uniquely identifies the key store configuration object. (String, required)

-keyStoreScope

The scope name of the key store. (String, optional)

Examples

Batch mode example usage:

Interactive mode example usage:


Related


Use the wsadmin scripting AdminTask object for scripted administration


Reference:

Commands for AdminTask using wsadmin.sh
Use wsadmin scripting with Jython


+

Search Tips   |   Advanced Search