[AIX HP-UX Linux Solaris Windows]

Managing keys with the gsk7cmd command line interface (Distributed systems)

The Java™ command line interface to IKEYMAN, gsk7cmd, provides the necessary options to create and manage keys, certificates and certificate requests.

About this task

Important: Only use gsk7cmd, the command line interface, if you are unable to implement IKEYMAN, the graphical user interface.
Global Security Kit (GSKit) certificate management tools are installed in the <ihsinst>/bin/ directory. These tools should only be run from the installation directory. Examples for the following commands should include the full directory path, such as <ihsinst>/bin/gsk7cmd.
  • [Windows] gsk7ver.bat, ikeyman.bat, gsk7cmd.bat, gsk7cmd, and gsk7capicmd.
  • [AIX] [Linux] [Solaris] gsk7ver, ikeyman, and gsk7cmd.

To have a secure network connection, create a key for secure network communications and receive a certificate from a certificate authority (CA) that is designated as a trusted CA on your server. Use gsk7cmd, the utility command line interface, for configuration tasks that are related to public and private key creation and management.

The gsk7cmd user interface uses Java and native command line invocation, enabling IKEYMAN task scripting.

You cannot use gsk7cmd for configuration options that update the server configuration file, httpd.conf. For options that update the server configuration file, use the IBM® HTTP Server administration server.

Procedure

What to do next

For more information about the gsk7cmd command line interface, see the GSKCapicmd User's Guide on the IHS Library page.



Subtopics
Using the gsk7cmd command
Key Management Utility command-line interface (gsk7cmd) syntax
Creating a new key database using the command-line interface
Managing the database password using the command line
Creating a new key pair and certificate request
Importing and exporting keys using the command line
Creating a self-signed certificate
Receiving a signed certificate from a certificate authority
Displaying default keys and certificate authorities
Storing a certificate authority certificate
Storing the encrypted database password in a stash file
Task topic    

Terms of Use | Feedback

Last updated: Oct 21, 2010 11:50:03 AM CDT
File name: cihs_ikeycmdline.html