Root-Certificate Fingerprint - HP 6125G Command Reference Manual

Security command reference
Hide thumbs Also See for 6125G:
Table of Contents

Advertisement

Description
Use pki validate-certificate to examine the validity of a certificate.
Certificate validity verification examines whether the certificate is signed by the CA and that the
certificate has neither expired nor been revoked.
Related commands: pki domain.
Examples
# Verify the validity of the local certificate.
<Sysname> system-view
[Sysname] pki validate-certificate local domain 1

root-certificate fingerprint

Syntax
root-certificate fingerprint { md5 | sha1 } string
undo root-certificate fingerprint
View
PKI domain view
Default level
2: System level
Parameters
md5: Uses an MD5 fingerprint.
sha1: Uses a SHA1 fingerprint.
string: Fingerprint to be used. An MD5 fingerprint must be a string of 32 characters in hexadecimal. A
SHA1 fingerprint must be a string of 40 characters in hexadecimal.
Description
Use root-certificate fingerprint to configure the fingerprint to be used for verifying the validity of the CA
root certificate.
Use undo root-certificate fingerprint to remove the configuration.
By default, no fingerprint is configured for verifying the validity of the CA root certificate.
Examples
# Configure an MD5 fingerprint for verifying the validity of the CA root certificate.
<Sysname> system-view
[Sysname] pki domain 1
[Sysname-pki-domain-1] root-certificate fingerprint md5
12EF53FA355CD23E12EF53FA355CD23E
# Configure a SHA1 fingerprint for verifying the validity of the CA root certificate.
[Sysname-pki-domain-1] root-certificate fingerprint sha1
D1526110AAD7527FB093ED7FC037B0B3CDDDAD93
195

Advertisement

Table of Contents
loading

This manual is also suitable for:

6125 blade switch series

Table of Contents