request security pki local-certificate enroll scep
Syntax
request security pki local-certificate enroll scep ca-profile ca-profile name certificate-id certificate-id-name challenge-password challenge-password digest (sha-1 | sha-256) domain-name domain-name email email-address ip-address ip-address ipv6-address ipv6-address logical-system (logical-system-name | all) scep-digest-algorithm (md5 | sha-1) scep-encryption-algorithm (des | des3) subject subject-distinguished-name
Release Information
Command introduced in Junos OS Release
9.1. Serial number (SN) option added to the subject string output
field in Junos OS Release 12.1X45. scep
keyword and ipv6-address
option added in Junos OS Release 15.1X49-D40.
Starting in Junos OS Release 20.1R1 on vSRX Virtual Firewall 3.0, you can safeguard
the private keys used by PKID and IKED using Microsoft Azure Key Vault
hardware security module (HSM) service. You can establish a PKI based
VPN tunnel using the keypairs generated at the HSM. The hub certificate-id
option under certificate-id is not available for configuration after
generating HSM key-pair.
Starting in Junos
OS Release 20.4R1 on vSRX Virtual Firewall 3.0, you can safeguard the private keys
used by PKID and IKED using AWS Key Management Service (KMS). You
can establish a PKI based VPN tunnel using the keypairs generated
by the KMS. The hub certificate-id
option under certificate-id
is not available for configuration after generating PKI key-pair.
Starting in Junos OS Release 22.4R2, logical-system
is introduced in
the statement for PKI SCEP certificate enrollment.
Description
Enroll and install a local digital certificate online by using Simple Certificate Enrollment Protocol (SCEP).
If you enter the request security pki local-certificate
enroll
command without specifying the scep
or cmpv2
keyword, SCEP is the default method for enrolling a local
certificate.
Options
ca-profile ca-profile-name | CA profile name. |
certificate-id certificate-id-name | Name of the local digital certificate and the public/private key pair. |
challenge-password password | Password set by the administrator and normally obtained from the SCEP enrollment webpage of the CA. The password is maximum 256 characters in length. You can enforce the limit to the required characters. |
digest (sha-1 | sha-256) | Hash algorithm used for signing RSA certificates, either SHA-1 or SHA-256. SHA-1 is the default. |
domain-name domain-name | Fully qualified domain name (FQDN). The FQDN provides the identity of the certificate owner for Internet Key Exchange (IKE) negotiations and provides an alternative to the subject name. |
email email-address | E-mail address of the certificate holder. |
ip-address ip-address | IP address of the router. |
ipv6-address ipv6-address | IPv6 address of the router for the alternate subject. |
logical-system (logical-system-name | all) |
Name of the logical system or all. This is optional. |
scep-digest-algorithm (md5 | sha-1) | Hash algorithm digest, either MD5 or SHA-1; SHA-1 is the default. |
scep-encryption-algorithm (des | des3) | Encryption algorithm, either DES or DES3; DES3 is the default. |
subject subject-distinguished-name | Distinguished Name (DN) format that contains the domain component, common name, department, serial number, company name, state, and country in the following format: DC, CN, OU, O, SN, L, ST, C.
|
Required Privilege Level
maintenance and security
Output Fields
When you enter this command, you are provided feedback on the status of your request.
Sample Output
command-name
user@host> request security pki local-certificate enroll scep certificate-id r3-entrust-scep ca-profile entrust domain-name router3.example.net subject "CN=router3,OU=Engineering,O=example,C=US" challenge-password 123
Certificate enrollment has started. To view the status of your enrollment, check the public key infrastructure log (pkid) log file at /var/log/pkid. Please save the challenge-password for revoking this certificate in future. Note that this password is not stored on the router.
Sample Output
Sample output for vSRX Virtual Firewall 3.0
user@host> request security pki generate-key-pair certificate-id example
Generated key pair example, key size 2048 bits
user@host> request security pki local-certificate enroll certificate-id ?
Possible completions: <certificate-id> Certificate identifier example
user@host> request security pki generate-key-pair certificate-id Hub
error: Failed to generate key pair at HSM. Found a key with the same name at HSM. Use a different certificate id next time. Refer to PKID logs for more details