CLI Guide
• Download Active Directory certificate:
racadm -r 192.168.0 -u root -p xxx sslcertdownload -t 2 -f ad_cert.txt
NOTE: This command is not supported in the firmware RACADM interface as it is not a file system.
sslcertupload
Table 85. Details of sslcertupload attribute
Description
Uploads a custom SSL server or CA certificate for Directory Service from the client to iDRAC.
To run this subcommand, you must have the Server Control privilege.
Synopsis
racadm sslcertupload -t <type> -f <filename> -p <passphrase> [-k <key file>]
Input
• -t <type>—Specifies the type of certificate to upload. The type of certificate must be:
• 1—Server Certificate
• 2—Active Directory
• 3—Public Key Cryptography Standards (PKCS) format
•
4—Client Trust certificate for SSL
• -f—Specifies the source filename in the local file system of the certificate uploaded.
• -p—Pass phrase for decrypting the PKCS12 file uploaded.
• -k—Filename of the private key file while using type 6 The private key is generated when the CSR is
generated. If the CSR is generated on another server, then it is necessary to upload the private key with the
certificate.
• -k—Specifies optional source filename for private key when using type 6.
Output
racadm -r 192.168.0.2 -u root -p xxx sslcertupload -t 2 -f cert.txt
Certificate successfully uploaded to the RAC.
Example
• Uploading a server certificate.
racadm -r 192.168.0.2 -u root -p xxx sslcertupload -t 1 -f cert.txt
• Upload web server certificate and key
racadm -r 192.168.0.2 -u root -p xxx sslcertupload -t 6 -f cert.txt -k
key.txt
• Uploading Active Directory Certificate
racadm -r 192.168.0.2 -u root -p xxx sslcertupload -t 2 -f ad_cert.txt
sslcertview
Table 86. Details of sslcertview attribute
Description Displays the SSL server or CA certificate that exists on iDRACCMC.
Synopsis
racadm sslcertview -t <type> [-A]
Input
• -t — Specifies the type of certificate to view, either the CA certificate or server certificate.
RACADM Subcommand Details 115