41-44
Cisco ASA 5500 Series Configuration Guide using the CLI
Chapter41 Configuring Digital Certificates
Feature History for Certificate Management
Certificate management 8.0(2) We introduced the following commands:
cdp-url, crypto ca server, crypto ca server crl issue,
crypto ca server revoke cert-serial-no, crypto ca server
unrevoke cert-serial-no, crypto ca server user-db add
user [dn dn] [email e-mail-address], crypto ca server
user-db allow {username | all-unenrolled |
all-certholders} [display-otp] [email-otp] [replace-otp],
crypto ca server user-db email-otp {username |
all-unenrolled | all-certholders}, crypto ca server
user-db remove username, crypto ca server user-db
show-otp {username | all-certholders | all-unenrolled},
crypto ca server user-db write, [no] database path
mount-name directory-path, debug crypto ca server
[level], lifetime {ca-certificate | certificate | crl} time, no
shutdown, otp expiration timeout, renewal-reminder
time, show crypto ca server, show crypto ca server
cert-db [user username | allowed | enrolled | expired |
on-hold] [serial certificate-serial-number], show crypto
ca server certificate, show crypto ca server crl, show
crypto ca server user-db [expired | allowed | on-hold |
enrolled], show crypto key name of key, show
running-config, shutdown.
SCEP proxy 8.4(1) We introduced this feature, which provides secure
deployment of device certificates from third-party CAs.
We introduced the following commands:
crypto ikev2 enable outside client-services port
portnumber, scep-enrollment enable,
scep-forwarding-url value URL,
secondary-pre-fill-username clientless hide
use-common-password password,
secondary-pre-fill-username ssl-client hide
use-common-password password,
secondary-username-from-certificate {use-entire-name
| use-script | {primary_attr [secondary-attr]}}
[no-certificate-fallback cisco-secure-desktop
machine-unique-id].
Table41-1 Feature History for Certificate Management (continued)
Feature Name
Platform
Releases Feature Information