
– –1=Base64
– –2=PKCS12
The current release does not support this option.
• -p — Pass phrase for decrypting the PKCS12 file uploaded.
• -k — Filename of the private key file while using type 6. The private key is generated when the
CSR is generated. If the CSR is generated on another server, then it is necessary to upload the
private key with the certificate.
Output The sslcertupload command returns 0 when successful and returns nonzero number when
unsuccessful.
Example
• Uploading a server certificate.
racadm sslcertupload -t 1 -f c:\cert\cert.txt
• Uploading a PKCS file without any passphrase.
racadm sslcertupload –t 3 –f <filename>
• Uploading a PKCS file with a passphrase.
racadm sslcertupload –t 3 –f <filename> –p <passphrase>
sslcertview
Description Displays the SSL server or CA certificate that exists on iDRAC.
To run this subcommand, you must have the iDRAC Login Privilege.
Synopsis
racadm sslcertview -t <type> [-A]
Input
• -t — Specifies the type of certificate to view, either the CA certificate or server certificate.
– 1=server certificate
– 2=CA certificate for Directory Service
• -A — Prevents printing headers or labels.
NOTE: If a certificate is generated using comma ‘,’ as one of the parameters for the Organization Name, Common
Name, Location Name, or State Name, then this command displays the partial name in the respective fields only up
to the comma. The rest of the string is not displayed.
NOTE: For CMC: For self-signed certificate, the common name includes PQDN (Partially qualified domain name) or
FQDN (Fully qualified domain name).
Output
racadm sslcertview -t 1
Serial
Number
01
Subject
Information:
Country
Code (CC)
US
129
Commentaires sur ces manuels