Your browser does not allow storing cookies. We recommend enabling them.

PreviousNextUp[Front page] [Index]


The ssh-ca-repair script examines the status of internal TLS certificates in the Certifier Engine and Certifier Server installations and fixes found problems.

On Windows, there are two separate scripts, ssh_ca_win32_repair_engine.bat for fixing problems in Engine+Server installations and ssh_ca_win32_repair_server.bat for fixing problems in Certifier subordinate server installations.

The script detects and fixes the following problems automatically:

  • No internal TLS CA found.
  • Internal TLS CA certificate expired or otherwise invalid.
  • Internal TLS CA marked as inactive.
  • Engine TLS certificate invalid or issued by a wrong CA.
  • Server marked inactive.
  • Server has no valid TLS client certificate.
  • No super-user operators in system.
  • Incorrect Database timestamp.

When run without parameters, the script diagnoses these problems and for each detected problem prompts for user confirmation before fixing the problem. After the automatically detected problems have been dealt with, the script displays a menu offering the following actions:

  • Change the operator password.
  • Create a PSK for operator.
  • Create a new super-user operator.
  • Create a new primary server.
  • Create new PSKs for subordinate servers.
  • Enroll a new CaComm TLS client certificate for primary server.
  • Write the system configuration summary to file.
  • Display the policy for the internal TLS CA.
  • Quit.

Setting Server Password

Enrolling a New Certificate for a Server

PreviousNextUp[Front page] [Index]


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more