sge_ca (8) - Linux Manuals

sge_ca: xxQS_NAMExx CSP Support control command

NAME

util/sgeCA/sge_ca - xxQS_NAMExx CSP Support control command

SYNTAX

sge_ca command [command options]

DESCRIPTION

sge_ca controls a simple xxQS_NAMExx Certificate Authority that is used for the special Certificate Security Protocol (CSP) mode. CSP mode improves the security behavior of xxQS_NAMExx by enabling OpenSSL secured communication channels and X509v3 certificates for authentication. In addition it is possible to export the key material or to create JKS keystores for the JMX connector. There follows a list of possible commands and command options to give an overview of what functionality is available. For further details about every command refer to the COMMAND DETAILS section.

COMMAND OVERVIEW

-help
Show usage.
-init [command options]
Create the infrastructure for a new xxQS_NAMExx Certificate Authority with its corresponding files and directories, and a set of keys and certificates for the xxQS_NAMExx daemon, root and admin user.
-req | -verify cert | -sign | -copy [command options]
Manipulate individual keys and certificates.
-print cert | -printkey key | -printcrl crl
Print out certificates, keys and certificate revocation lists in human readable form.
-showCaTop | -showCaLocalTop [command options]
Echo the $CATOP or $CALOCALTOP directory. This command is usually run as root on the qmaster host after a CA infrastructure has been created. If "-cadir", "-catop" or "-calocaltop" are set, the corresponding directories are printed.
-usercert user file | -user u:g:e | -sdm_daemon u:g:e [command options]
Create certificates and keys for a bunch of users contained in user file, a single user, or SDM daemon in the form u:g:e.
-pkcs12 user | -sdm_pkcs12 g | -sys_pkcs12 [command options]
Export the certificate and key for user user or SDM daemon g in PKCS12 format and to export the xxQS_NAMExx daemon certificate and key in PKCS12 format.
-userks | -ks user | -sysks [command options]
Create keystore for all users with a certificate and key, the keystore for a single user user, or the keystore containing the xxQS_NAMExx daemon certificate and key.
-renew user | -renew_ca | -renew_sys | -renew_sdm g [command options]
Renew the certificate for user user, for the CA, for the xxQS_NAMExx daemon, or the SDM daemon with common name g. The old certificate remains valid until it expires. NB. The option of this name was re-named to -rrenew in xxQS_NAMExx 8.1.9.
-rrenew user | -rrenew_ca | -rrenew_sys | -rrenew_sdm g [command options]
Renew the certificate for user user, for the CA, for the xxQS_NAMExx daemon, or the SDM daemon with common name g, and revoke the old ones (updating the revocation list). NB. This requires unique_subject=no in sge_ssl_template.cnf, which is the default for new installations, but might not be set for old ones.
-revoke cert
Revoke the certificate cert, which should be an actual PEM file, updating the revocation list.

In the above, "command options" is a combination of the following options depending on the command. The COMMAND DETAILS section explains which options are usable for each command.

-days days
days of validity of the certificate
-sha1
Use SHA-1 instead of MD5 as message digest
-encryptkey
Use DES to encrypt the generated private key with a passphrase. The passphrase is requested when a key is created or used.
-outdir dir
Write to directory dir
-cahost host
Define CA hostname (CA master host)
-cadir dir
Define $CALOCALTOP and $CATOP settings as dir.
-calocaltop dir
Define $CALOCALTOP setting
-catop dir
Define $CATOP setting
-kspwf file
Define a keystore password file that contains a password that is used to encrypt the keystore and the keys contained therein
-ksout file
Define output file to write the keystore to
-pkcs12pwf file
Define a PKCS12 password file that contains a password that is used to encrypt the PKCS12 export file and the keys contained therein
-pkcs12dir dir
Define the output directory dir to write the exported PKCS12 format file to. Otherwise the current working directory is used.

COMMAND DETAILS

sge_ca -init [-cadir dir] [-catop dir] [-calocaltop dir] [-adminuser admin] [-days num days]

The -init command creates a new xxQS_NAMExx certificate authority and its corresponding files. Usually "sge_ca -init" is run by user root on the master host. If the options -adminuser, -cadir, -calocaltop, and -catop are not used, and the xxQS_NAMExx environment variables SGE_ROOT, SGE_CELL and SGE_QMASTER_PORT are set, the CA directories are created in the following locations: $SGE_ROOT/$SGE_CELL/common/sgeCA (can be overruled by -catop dir or -cadir dir)
/var/lib/sgeCA/port$SGE_QMASTER_PORT/$SGE_CELL or /var/lib/sgeCA/sge_qmaster/$SGE_CELL (can be overruled by -calocaltop dir or -cadir dir).
The following information must be delivered for the site: two letter country code, state, location, e.g. city or your building code, organization (e.g. your company name), organizational unit, e.g. your department, and email address of the CA administrator (you!).

Certificates and keys are generated for the CA itself, the xxQS_NAMExx daemon, installation user (usually root), and finally for the admin user.

How and where the certificates and keys are created can be influenced additionally by:

-days days
Change the time of validity of the certificates to number of days instead of 365 days
-sha1
Change the message digest algorithm from MD5 to SHA-1
-encryptkey
Encrypt the generated keys with a passphrase
-adminuser user
Use user as admin user
-cahost host
Use host as the CA master host
[-cadir dir] [-catop dir] [-calocaltop dir]
Set $CATOP and $CALOCALTOP to dir to use something other than the xxQS_NAMExx default directories. Either -cadir dir has to be specified to replace $CATOP and $CALOCALTOP by the same directory or -catop dir for $CATOP and -calocaltop dir for $CALOCALTOP.
sge_ca -user u:g:e [-cadir dir] [-catop dir] [-calocaltop dir] [-adminuser admin] [-days days]
Generate user certificate and keys for u:g:e, where u is the user id, g is the "common name" (real name of the user), and e is the user's email address. By default the certificate is valid for 365 days or for days, as specified with -days days. This command is usually run as user root on the qmaster host. $CATOP and $CALOCALTOP may be overruled by -cadir, -catop, and -calocaltop.
sge_ca -sdm_daemon u:g:e
Generate daemon certificate and keys for u:g:e with parameters and lifetime as for -user. This command is usually run as user root on the qmaster host.
sge_ca -usercert user file [-cadir dir] [-catop dir] [-calocaltop dir] [-adminuser admin] [-days days] [-encryptkey] [-sha1]
Usually sge_ca -usercert user file is run as user root on the master host. The argument user file contains a list of users in the following format:


         eddy:Eddy Smith:eddy [at] griders.org

         sarah:Sarah Miller:sarah [at] griders.org

         leo:Leo Lion:leo [at] griders.org
where the fields separated by colon are:

         Unix user:Gecos field:email address
sge_ca -renew user [-cadir dir] [-catop dir] [-calocaltop dir] [-adminuser admin] [-days days]
Renew the certificate for user. By default the certificate is extended for 365 days or for days specified with -days days. If the value is negative the certificate becomes invalid. This command is usually run as user root on the qmaster host. $CATOP and $CALOCALTOP may be overruled by -cadir, -catop, and -calocaltop.
sge_ca -renew_ca [-cadir dir] [-catop dir] [-calocaltop dir] [-adminuser admin] [-days days]
Renew the CA certificate, similarly to -renew.
sge_ca -renew_sys [-cadir dir] [-catop dir] [-calocaltop dir] [-adminuser admin] [-days days]
Renew the xxQS_NAMExx daemon certificate, similarly to -renew.
sge_ca -renew_sdm g [-cadir dir] [-catop dir] [-calocaltop dir] [-adminuser admin] [-days days]
Renew the SDM daemon certificate of g, where g is the common name of the daemon, similarly to -renew.
sge_ca -pkcs12 user [-pkcs12pwf file] [-pkcs12dir dir] [-cadir dir] [-catop dir] [-calocaltop dir] [-adminuser admin]
Export certificate and key of user user (Unix user name) in PKCS12 format. This command is usually run as user root on the qmaster host. If -pkcs12pwf file is used, the file and the corresponding key will be encrypted with the password in file. If -pkcs12dir dir is used, the output file is written into dir/user.p12 instead of ./user.p12. $CATOP and $CALOCALTOP may be overruled by -cadir, -catop, and -calocaltop.
sge_ca -sys_pkcs12 [-pkcs12pwf file] [-pkcs12dir dir] [-cadir dir] [-catop dir] [-calocaltop dir] [-adminuser admin]
Export certificate and key of xxQS_NAMExx daemon in PKCS12 format, similarly to -pkcs12.
sge_ca -sdm_pkcs12 g [-pkcs12pwf file] [-pkcs12dir dir] [-cadir dir] [-catop dir] [-calocaltop dir] [-adminuser admin]
Export certificate and key of SDM daemon with common name g in PKCS12 format,, similarly to -renew.
sge_ca -ks user [-ksout file] [-kspwf file] [-cadir dir] [-catop dir] [-calocaltop dir] [-adminuser admin]
Create a keystore containing certificate and key of user user in JKS format where user is the Unix user name. This command is usually run as user root on the qmaster host. If -kspwf file is used the keystore and the corresponding key will be encrypted with the password in file. The -ksout file option specifies the keystore file that is created. If the -ksout file option is missing the default location for the keystore is $CALOCALTOP/userkeys/user/keystore. This command is usually invoked by sge_ca -userks. A prerequisite is a valid JAVA_HOME environment variable setting. $CATOP and $CALOCALTOP may be overruled by -cadir, -catop and -calocaltop.
sge_ca -userks [-kspwf file] [-cadir dir] [-catop dir] [-calocaltop dir] [-adminuser admin]
Generate a keystore in JKS format for all users having a key and certificate. This command is usually run as user root on the qmaster host. If -kspwf file is used, the keystore and the corresponding key will be encrypted with the password in file. The keystore files are created in $CALOCALTOP/userkeys/user/keystore. This command is run after user certificates and keys have been created with Bsge_ca -usercert userfile or if any of the certificates have been renewed. $CATOP and $CALOCALTOP may be overruled by -cadir, -catop and -calocaltop.
sge_ca -sysks [-kspwf file] [-cadir dir] [-catop dir] [-calocaltop dir] [-adminuser admin]
Generate a keystore containing the xxQS_NAMExx daemon certificate and key in JKS format. This command is usually run as user root on the qmaster host. If -kspwf file is used the keystore and the corresponding key will be encrypted with the password in file. The keystore file is created in $CALOCALTOP/private/keystore. $CATOP and $CALOCALTOP may be overruled by -cadir, -catop and -calocaltop.
sge_ca -print cert
Print a PEM-format certificate cert.
sge_ca -printkey key
Print a PEM-format key key.
sge_ca -printcrl crl
Print a PEM-format certificate revocation list crl.
sge_ca -req [-cadir dir] [-catop dir] [-calocaltop dir] [-adminuser admin] [-days days] [-encryptkey] [-sha1] [-outdir dir]
Create a private key and a certificate request for the calling user. These are created as newkey.pem and newreq.pem in the current working directory. If the option -outdir dir is specified in addition the files are created in dir.
sge_ca -sign [-cadir dir] [-catop dir] [-calocaltop dir] [-adminuser admin] [-days days] [-encryptkey] [-sha1] [-outdir dir]
Sign a certificate request. The CA certificate under $CATOP (default $SGE_ROOT/$SGE_CELL/common/sgeCA), and CA key from $CALOCALTOP (default /var/sgaCA/{port$SGE_QMASTER_PORT|sge_qmaster}/$SGE_CELL) are used for the signature. If $CATOP and $CALOCALTOP are set to a different directory the information there is used. The certificate is created as newcert.pem in the current working directory or in dir if the option -outdir dir has been specified. In addition the option "-days number of days" can be specified to change the default validity from 365 to number of days.
sge_ca -verify cert [-cadir dir] [-catop dir] [-calocaltop dir] [-adminuser admin]
Verify a certificate's validity where cert is the certificate in pem format. $CATOP and $CALOCALTOP can be overruled by -cadir, -catop and -calocaltop.
sge_ca -copy [-cadir dir] [-catop dir] [-calocaltop dir]
Run by a user to copy their certificate and key on the master host to $HOME/.sge/port$SGE_QMASTER_PORT/$SGE_CELL/certs/cert.pem and the corresponding private key to $HOME/.sge/port$SGE_QMASTER_PORT/$SGE_CELL/private/key.pem, which are used instead of the files in $CATOP and $CALOCALTOP. The command is only recommended for testing purposes, or where $HOME is on a secure shared file system.

EXAMPLES

# sge_ca -init -cadir /tmp -sha1 -encryptkey -days 31
Create a CA infrastructure in /tmp with a certificate validity of 31 days using SHA-1 instead of MD5 as message digest. The keys are encrypted and a passphrase has to be entered during the creation of the different keys or during signing a certificate with the created CA key.
# sge_ca -usercert /tmp/myusers.txt -cadir /tmp
/tmp/myusers.txt contains
user1:My User:user1 [at] myorg.org
and user1 is a valid Unix user account. Create a key and certificate for user1.
# sge_ca -userks -cadir /tmp
Create a keystore for all users of the simple CA. The keystore is stored under /tmp/userkeys/user/keystore.
# sge_ca -renew root -cadir /tmp -days -1
Make the root certificate temporarily invalid.
# sge_ca -renew_ca -days 365 -cadir /tmp
Renew the CA certificate for 365 days.

ENVIRONMENT VARIABLES

SGE_ROOT
Specifies the location of the xxQS_NAMExx standard configuration files.
SGE_CELL
If set, specifies the default xxQS_NAMExx cell.

RESTRICTIONS

The command must usually be called with xxQS_NAMExx root permissions on the master host. For more details on the permission requirements consult the detailed description for the different commands above.

FILES

sge_ca creates a file tree starting in $CATOP and $CALOCALTOP. The default for $CATOP is usually $SGE_ROOT/$SGE_CELL/common/sgeCA and for $CALOCALTOP /var/lib/sgeCA/{port$SGE_QMASTER_PORT|sge_qmaster}/$SGE_CELL where the subpaths beginning with $ expand to the content of the corresponding environment variable.

In addition there may optionally exist the user certificate in $HOME/.sge/port$SGE_QMASTER_PORT/$SGE_CELL/certs/cert.pem and the corresponding private key in $HOME/.sge/port$SGE_QMASTER_PORT/$SGE_CELL/private/key.pem which are used instead of the files in $CATOP and $CALOCALTOP. (See sge_ca -copy above.)

SGE_ROOT/util/sgeCA/sge_ssl_template.cnf: OpenSSL configuration file.

SGE_ROOT/util/sgeCA/sge_ssl.cnf: OpenSSL configuration file used for signing.

COPYRIGHT

See for a full statement of rights and permissions.

SEE ALSO