crypto ca authenticate

Downloads the CA certificate from the remote certificate server for the trust point.

Syntax

crypto ca authenticate { trustpointCA_name directory remote_dir_name file cert_file host host_address protocol {FTP | SCP} user host_login password host_user_password}
no crypto ca authenticate { trustpointCA_name}

Parameters

trustpointCA_name trustpointCA_name
Defines the name of the trust point you are authenticating. This name needs to be the same as that of the trust point created by the crypto ca trustpoint command. The string for the name can not be left blank. The length of the string can range from 1 through 64 characters.
directory remote_dir_name
Defines the directory where the certification file resides.
file cert_file
Defines the name of the certification file.
host host_address
Defines the host name or IP address of the remote certificate server.
protocol {FTP | SCP}
Specifies the use of either FTP or SCP protocol for accessing the certification file.
user host_login
Defines user name for the host server.
password host_user_password
Defines the password for the user name on the host server.
Note

Note

It is recommended to not list the password in command line for security purposes; the user will be prompted for the password.

Modes

Privileged EXEC mode

Usage Guidelines

This is the CA certificate of the Trusted CA that you want to sign the CSR and generate the identity certificate.

The trustpoint_CAname name needs to be the same as that of the trust point created by the crypto ca trustpoint command.

The no form of the command deletes the certificate.

Examples

Typical command example.

device# crypto ca authenticate t1 cert-type https protocol SCP host 10.70.12.102 user fvt directory /users/home/crypto file cacert.pem
Password: **********