Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

show security pki certificate-request

Syntax

Description

Display information about manually generated local digital certificate requests that are stored in the router.

Options

none

(same as brief) Display information about all local digital certificate requests.

brief | detail

(Optional) Display the specified level of output.

certificate-id certificate-id-name

(Optional) Display information about only the specified local digital certificate request

Required Privilege Level

view

Output Fields

Table 1 lists the output fields for the show security pki certificate-request command. Output fields are listed in the approximate order in which they appear.

Table 1: show security pki certificate-request Output Fields

Field Name

Field Description

Level of Output

Certificate identifier

Name of the digital certificate.

All levels

Certificate version

Revision number of the digital certificate.

detail

Issued to

Device that was issued the digital certificate.

none brief

Subject

Details of the digital certificate holder organized using the distinguished name format. Possible subfields are:

  • Common name—Name of the authority.

  • Organization—Organization of origin.

  • Organizational unit—Department within an organization.

  • State—State of origin.

  • Country—Country of origin.

detail

Alternate subject

Domain name or IP address of the device related to the digital certificate.

detail

Validity

Time period when the digital certificate is valid. Values are:

  • Not before—Time when the digital certificate becomes valid.

  • Not after—End time when the digital certificate becomes invalid.

All levels

Public key algorithm

Encryption algorithm used with the private key, such as rsaEncryption(1024 bits).

All levels

Public key verification status

Public key verification status: Failed or Passed. The detail output also provides the verification hash.

All levels

Fingerprint

Secure Hash Algorithm (SHA1) and Message Digest 5 (MD5) hashes used to identify the digital certificate.

detail

Use for key

Use of the public key, such as Certificate signing, CRL signing, Digital signature, or Key encipherment.

detail

Sample Output

show security pki certificate-request

show security pki certificate-request detail

Release Information

Command introduced in Junos OS Release 7.5.