crypto ca authenticate
Downloads the CA certificate from the remote certificate server for the trust point.
Syntax
crypto ca authenticate
{
trustpointCA_name
directory
remote_dir_name
file
cert_file
host
host_address
protocol
{FTP
|
SCP}
user
host_login
password
host_user_password}
no crypto ca authenticate
{
trustpointCA_name}
Parameters
- trustpointCA_name
trustpointCA_name
- Defines the name of the trust point you are authenticating. This name needs to be the same as that of the trust point created by the
crypto ca trustpoint command. The string for the name can not be left blank. The length of the string can range from 1 through 64 characters.
- directory
remote_dir_name
- Defines the directory where the certification file resides.
- file
cert_file
- Defines the name of the certification file.
- host
host_address
- Defines the host name or IP address of the remote certificate server.
- protocol
{FTP
|
SCP}
- Specifies the use of either FTP or SCP protocol for accessing the certification file.
- user
host_login
- Defines user name for the host server.
- password
host_user_password
- Defines the password for the user name on the host server.

Note
It is recommended to not list the password in command line for security purposes; the user will be prompted for the password.
Modes
Privileged EXEC mode
Usage Guidelines
This is the CA certificate of the Trusted CA that you want to sign the CSR and generate the identity certificate.
The
trustpoint_CAname name needs to be the same as that of the trust point created by the
crypto ca trustpoint command.
The
no form of the command deletes the certificate.
Examples
Typical command example.
device# crypto ca authenticate t1 cert-type https protocol SCP host 10.70.12.102 user fvt directory /users/home/crypto file cacert.pem
Password: **********