Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

show security pki ca-certificate

Syntax

Description

Display information about certificate authority (CA) digital certificates installed in the router.

Options

none

(Same as brief) Display information about all CA digital certificates.

brief | detail

(Optional) Display the specified level of output.

ca-profile ca-profile-name

(Optional) Display information about only the specified CA profile.

Required Privilege Level

view

Output Fields

Table 1 lists the output fields for the show security pki ca-certificate command. Output fields are listed in the approximate order in which they appear.

Table 1: show security pki ca-certificate Output Fields

Field Name

Field Description

Level of Output

Certificate identifier

Name of the digital certificate.

All levels

Certificate version

Revision number of the digital certificate.

detail

Serial number

Unique serial number of the digital certificate.

detail

Issued by

Authority that issued the digital certificate.

none brief

Issued to

Device that was issued the digital certificate.

none brief

Issuer

Authority that issued the digital certificate, including details of the authority organized using the distinguished name format. Possible subfields are:

  • Common name—Name of the authority.

  • Organization—Organization of origin.

  • Organizational unit—Department within an organization.

  • State—State of origin.

  • Country—Country of origin.

detail

Subject

Details of the digital certificate holder organized using the distinguished name format. Possible subfields are:

  • Common name—Name of the requestor.

  • Organization—Organization of origin.

  • Organizational unit—Department within an organization.

  • State—State of origin.

  • Country—Country of origin.

detail

Validity

Time period when the digital certificate is valid. Values are:

  • Not before—Start time when the digital certificate becomes valid.

  • Not after—End time when the digital certificate becomes invalid.

All levels

Public key algorithm

Encryption algorithm used with the private key, such as rsaEncryption(1024 bits).

All levels

Signature algorithm

Encryption algorithm that the CA used to sign the digital certificate, such as sha1WithRSAEncryption.

detail

Fingerprint

Secure Hash Algorithm (SHA1) and Message Digest 5 (MD5) hashes used to identify the digital certificate.

detail

Distribution CRL

Distinguished name information and the URL for the certificate revocation list (CRL) server.

detail

Use for key

Use of the public key, such as Certificate signing, CRL signing, Digital signature, or Key encipherment.

detail

Sample Output

show security pki ca-certificate

show security pki ca-certificate detail

Release Information

Command introduced in Junos OS Release 7.5.