Displaying and maintaining pki, Pki configuration examples, Certificate request from an rsa keon ca server – H3C Technologies H3C SecBlade LB Cards User Manual
Page 149
138
Step Command
Remarks
2.
Create a certificate attribute
group and enter its view.
pki certificate attribute-group
group-name
No certificate attribute group
exists by default.
3.
Configure an attribute rule for
the certificate issuer name,
certificate subject name, or
alternative subject name.
attribute id { alt-subject-name
{ fqdn | ip } | { issuer-name |
subject-name } { dn | fqdn | ip } }
{ ctn | equ | nctn | nequ }
attribute-value
Optional.
No restriction exists on the issuer
name, certificate subject name
and alternative subject name by
default.
4.
Return to system view.
quit
N/A
5.
Create a certificate
attribute-based access control
policy and enter its view.
pki certificate access-control-policy
policy-name
No access control policy exists by
default.
6.
Configure a certificate
attribute-based access control
rule.
rule [ id ] { deny | permit }
group-name
No access control rule exists by
default.
A certificate attribute group must
exist to be associated with a rule.
Displaying and maintaining PKI
Task Command
Remarks
Display the contents or request
status of a certificate.
display pki certificate { { ca | local } domain
domain-name | request-status } [ | { begin |
exclude | include } regular-expression ]
Available in any view.
Display CRLs.
display pki crl domain domain-name [ | { begin
| exclude | include } regular-expression ]
Available in any view.
Display information about one or
all certificate attribute groups.
display pki certificate attribute-group
{ group-name | all } [ | { begin | exclude |
include } regular-expression ]
Available in any view.
Display information about one or
all certificate attribute-based
access control policies.
display pki certificate access-control-policy
{ policy-name | all } [ | { begin | exclude |
include } regular-expression ]
Available in any view.
PKI configuration examples
The SCEP add-on is required when you use the Windows Server as the CA. In this case, when you
configure the PKI domain, you must use the certificate request from ra command to specify that the entity
requests a certificate from an RA.
The SCEP add-on is not required when RSA Keon is used. In this case, when configuring a PKI domain,
you need to use the certificate request from ca command to specify that the entity requests a certificate
from a CA.
Certificate request from an RSA Keon CA server
1.
Network requirements