Your browser does not allow storing cookies. We recommend enabling them.

PreviousNextUp[Front page] [Index]


The following options are available:

  • -t

    Checks the database timestamp.

  • -T

    Resets the database timestamp.

  • -l

    Tests the database connection.

  • -o log|crl|request|certificate months

    Purges obsolete data. Expired certficates, old log messages, resolved requests, or CRLs can be deleted. months is a positive integer, all items that are older than given limit are deleted.

  • -b [private-keys] cas|log|certificates|requests|entities

    Dumps database contents into stdout as ASLs. If private-keys is given, the output of the certificates and cas options contain private keys.

  • -C ca_name certificate|privatekey|configuration output_file

    Writes CA-specific data to output_file. Either CA certificate, private key, or CA configuration is written.

  • -g certificate_description_file

    Generates a certificate.

  • -a certificate_or_request_file

    Inserts a certificate or a certificate request in the database.

  • -P private_key_file

    Gives the private key for the -a option.

  • -w object_id cert_output_file

    Writes the certificate identified with object_id to a file.

  • -k object_id private_key_output_file

    Writes the private key identified by its certificate object ID to a file.

  • -p pskfile

    Inserts PSK in the database. Input is a file with PSK configuration.

  • -r entropy_file

    Reads random input from a file and stirs it into random pool in the database.

  • -i

    Initializes the database.

  • -d

    Deletes the database. Warning! This option clears all Certifier-related data from the database.

PreviousNextUp[Front page] [Index]




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now