crypto ca authenticate
Identifies the root CA certificate,
which is used to sign the Certificate Signing Request (CSR) to generate the server
certificate.
Syntax
crypto ca authenticate
{trustpoint-name
cert-type
{
commoncert
|
https
|
ssh-x509v3}directory
dirname
file
file-name
host
host-address
protocol
source-ipsource-ip{FTP |
SCP}
user
user-name
password
password}
no crypto ca
authenticate
{
trustpoint_name
cert-type
{
commoncert
|
https
|
ssh-x509v3}
Parameters
- trustpoint-name
- Defines the name of the trustpoint you are
authenticating. This name needs to be the same as that of the trustpoint
created by the crypto ca trustpoint command. The string for the name cannot
be left blank. The length of the string can range from 1 through 64
characters.
- cert-type
{commoncert
|
https
|
ssh-x509v3}
- Indicates that the certificate is used for
common, HTTPS, or SSH-x509v3 server authentication.
- directory
dir-name
- Defines the path to the
directory where the certification file resides.
- file
file-name
- Defines the name of the
certification file.
- host
host-address
- Specifies the host name or IP
address of the remote certificate server.
- protocol
{FTP
|
SCP}
- Specifies the use of either
FTP or SCP protocol for accessing the certification file.
- user
user-name
- Specifies the user name for
the host server.
- source-ip
source-ip
- (SCP only) Specifies the source IP address to use in the header.
- password
password
- Specifies the password for the user to access the host server.
Modes
Privileged EXEC mode
Usage Guidelines
Use this command to identify the CA certificate
of the Trusted CA that you want to sign the CSR and generate the identity
certificate.
The trustpoint-name name
needs to be the same as that of the trustpoint created by the crypto ca trustpoint
command.
The no form of the command
deletes the specified certificate.
Note
As a best practice, do not list the
password in the command line for security purposes. The user will be prompted for
the password.
Examples
This example specifies HTTPS authentication and
the SCP protocol.
device# crypto ca authenticate t1 cert-type https protocol SCP host 10.70.12.102
user fvt directory /users/home/crypto file cacert.pem password ****
This example specifies SSH-x509v3 authentication and the SCP protocol.
crypto ca enroll myca cert-type ssh-x509v3 protocol SCP country IN state KA
locality Bangalore organization Extreme orgunit Engg common 10.24.12.xx directory /root/certs
host x.x.x.x user root password ****