|
From: Daniel J. <Dan...@e-...> - 2013-06-05 13:07:49
|
/opt/ejbca/bin/ejbca.sh ca init AC_Racine 'CN=AC_Racine, OU=Department, O=MyCompany, C=FR' 'org.ejbca.core.model.ca.catoken.PKCS11CAToken' prompt 4096 RSA 10000 1.2.250.1.79.12 SHA1WithRSA /opt/ejbca/conf/catoken-Racine.properties # Configuration file were you define key name, password and key alias for the HSM. # This file is used when adding a CA using an HSM during 'ant install' or with the CLI (command line interface). # Same as the Hard CA Token Properties in Admin-GUI. # Remove everything in the file and add your own configuration. # # See the User's Guide locally or at ejbca.org for details and the latest news. # # Possible values differ depending on which HSM you are using. # Common for all HSM are: # * certSignKey - the key to be used when signing certificates, can be RSA or ECDSA. # * crlSignKey - the key to be used when signing CLSs, can be RSA or ECDSA. # * keyEncryptKey - the key to be used for key encryption and decryption, this must be an RSA key. # * testKey - the key to be used by HSM status checks, can be RSA or ECDSA. # * hardTokenEncrypt - the key to be used for hardtoken encryption and decryption. PUK will be decrypted by this key. # * defaultKey - the key to be used when no other key is defined for a purpose. If this is the only definition then this key will be used for all purposes. # # Example for nCipher HSM using the JCE interface: # keyStore 2349823489289asd2387234 sharedLibrary /opt/nfast/toolkits/pkcs11/libcknfast.so slotListIndex 1 defaultKey defaultRoot keyEncryptKey cryptRoot hardTokenEncrypt cryptRoot testKey testRoot pin foo123 |