kmfcfg - Key Management Policy and Plugin Configuration Utility
kmfcfg subcommand [option ...]
The kmfcfg command allows users to configure Key Management Framework (KMF) policy databases. The KMF policy database (DB) restricts the use of keys and certificates that are managed through the KMF framework.
kmfcfg provides the ability to list, create, modify, delete, import and export policy definitions either in the system default database file /etc/security/kmfpolicy.xml or a user-defined database file.
For plugin configuration, kmfcfg allows users to display plugin information, install or uninstall a KMF plugin, and modify the plugin option.
The following subcommands are supported:
create
The format for the create subcommand is as follows:
create [dbfile=dbfile] policy=policyname [ignore-date=true|false] [ignore-unknown-eku=true|false] [ignore-trust-anchor=true|false] [validity-adjusttime=adjusttime] [ta-name=trust anchor subject DN] [ta-serial=trust anchor serial number] [ocsp-responder=URL] [ocsp-proxy=URL] [ocsp-use-cert-responder=true|false] [ocsp-response-lifetime=timelimit] [ocsp-ignore-response-sign=true|false] [ocsp-responder-cert-name=Issuer DN] [ocsp-responder-cert-serial=serial number] [crl-basefilename=basefilename] [crl-directory=directory] [crl-get-crl-uri=true|false] [crl-proxy=URL] [crl-ignore-crl-sign=true|false] [crl-ignore-crl-date=true|false] [keyusage=digitalSignature|nonRepudiation |keyEncipherment | dataEncipherment | keyAgreement |keyCertSign | cRLSign | encipherOnly | decipherOnly],[...] [ekunames=serverAuth | clientAuth | codeSigning | emailProtection | ipsecEndSystem | ipsecTunnel | ipsecUser | timeStamping | OCSPSigning],[...] [ekuoids=OID,OID,OID...]
The create subcommand supports the following options:
crl-basefilename=filename
crl-directory=directory
If the crl-get-crl-uri attribute is set to true and the crl-basefilename is not specified, the basefilename for the cached CRL file is the basename of the URI used to fetch the CRL file.
If the crl-get-crl-uri attribute is set to false the crl-basefilename needs to be specified to indicate an input CRL file. The setting for crl-get-crl-uri is false by default.
These two attributes only apply to the file-based CRL plugins. The current file-based CRL plugins are file and pkcs11 keystores. For the nss keystore, the CRL location is always the NSS internal database.
crl-get-crl-uri=true | false
The default for this attribute is false.
crl-ignore-crl-date=true | false
The default for this attribute is false.
crl-ignore-crl-sign=true | false
The default for this attribute is false.
crl-proxy= URL
The port number is optional. If the port number is not specified, the default value is 8080. An example crl-proxy setting might be: crl-proxy=webcache.sfbay:8080.
dbfile=dbfile
ekuoids=EKUOIDS
ekunames=EKUNAMES
The OCSP, CRL, key usage and extended key usage checkings are off by default. To turn on any one of them, specify one or more attributes for the particular checking. For example, if the ocsp-responder attribute is set, then the OCSP checking is turned on. If the ekuname attribute or the ekuoids attribute is set, then the extended key usage checking is turned on.
ignore-date=true | false
ignore-unknown-eku=true | false
ignore-trust-anchor=true | false
keyusage=KUVALUES
ocsp-ignore-response-sign=true | false
ocsp-proxy=URL
ocsp-response-lifetime=timelimit
ocsp-responder-cert-name=IssuerDN
ocsp-responder-cert-serial=serialNumber
ocsp-responder=URL
ocsp-use-cert-responder=true | false
policy=policyname
validity-adjusttime=adjusttime
These two attributes represent the trust anchor certificate and are used to find the trust anchor certificate in the keystore. The ta-name is to specify the distinguished name of the trust anchor certificate subject name. For example, ta-name="O=Sun Microsystems Inc., OU=Solaris Security Technologies Group, L=Ashburn, ST=VA, C=US, CN=John Smith" The serial number of the TA certificate. This, along with the Issuer DN, is used to find the TA certificate in the keystore. The serial number must be specified as a hex value, for example, 0x0102030405060708090a0b0c0d0e The trust anchor attributes need to be set, if the value of ignore-trust-anchor attribute is false.
delete
The format for the delete subcommand is as follows:
delete [dbfile=dbfile] policy=policyname
The delete subcommand supports the following options:
dbfile=dbfile
policy=policyname
export
The format for the export subcommand is as follows:
kmfcfg export policy=policyname outfile=newdbfile [dbfile=dbfile]
The export subcommand supports the following options:
dbfile=dbfile
outfile=outputdbfile
policy=policyname
help
The format for the help subcommand is as follows:
help
import
The format for the import subcommand is as follows:
kmfcfg import policy=policyname infile=inputdbfile [dbfile=dbfile]
The import subcommand supports the following options:
policy=policyname
infile=inputdbfile
dbfile=outdbfile
list
The format for the list subcommand is as follows:
list [dbfile=dbfile] [policy=policyname]
The list subcommand supports the following options:
dbfile=dbfile
policy=policyname
modify
The format for the modify subcommand is as follows:
modify [dbfile=dbfile] policy=policyname [ignore-date=true|false] [ignore-unknown-eku=true|false] [ignore-trust-anchor=true|false] [validity-adjusttime=adjusttime] [ta-name=trust anchor subject DN] [ta-serial=trust anchor serial number] [ocsp-responder=URL] [ocsp-proxy=URL] [ocsp-use-cert-responder=true|false] [ocsp-response-lifetime=timelimit] [ocsp-ignore-response-sign=true|false] [ocsp-responder-cert-name=Issuer DN] [ocsp-responder-cert-serial=serial number] [ocsp-none=true|false] [crl-basefilename=basefilename] [crl-directory=directory] [crl-get-crl-uri=true|false] [crl-proxy=URL] [crl-ignore-crl-sign=true|false] [crl-ignore-crl-date=true|false] [crl-none=true|false] [keyusage=digitalSignature| nonRepudiation |keyEncipherment | dataEncipherment | keyAgreement |keyCertSign | cRLSign | encipherOnly | decipherOnly],[...] [keyusage-none=true|false] [ekunames=serverAuth | clientAuth | codeSigning | emailProtection | ipsecEndSystem | ipsecTunnel | ipsecUser | timeStamping | OCSPSigning],[...] [ekuoids=OID,OID,OID] [eku-none=true|false]
The modify subcommand supports many of the same options as the create subcommand. For descriptions of shared options, see the create subcommand.
The modify subcommand supports the following unique options:
crl-none=true | false
dfile=[dbfile]
eku-none=true | false
keyusage-none=true | false
The keyusage attribute cannot be set at the same time if this attribute is set to true.
ocsp-none=true | false
policy=policyname
install keystore=keystore_name modulepath=pathname\ [option=option_str]
list plugin
Without the pluginkeyword, kmfcfg list shows the policy information as described in the SUBCOMMANDS section.
modify plugin keystore=keystore_name option=option_str
Without the plugin keyword, kmfcfg modify updates the policy configuration as described in the SUBCOMMANDS section.
uninstall keystore=keystore_name
Example 1 Creating a New Policy
The following example creates a new policy called IPSEC in the system database:
$ kmfcfg create IPSEC \ ignore-trust-anchor=true \ ocsp-use-cert-responder=true \ keyusage=keyAgreement,keyEncipherment,dataEncipherment \ ekuname=ipsecTunnel,ipsecUser
The following exit values are returned:
0
>0
/etc/security/kmfpolicy.xml
See attributes(5) for descriptions of the following attributes:
|
attributes(5)
Закладки на сайте Проследить за страницей |
Created 1996-2024 by Maxim Chirkov Добавить, Поддержать, Вебмастеру |