Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?


show security pki certificate-request



Display information about manually generated local digital certificate requests that are stored in the router.



(same as brief) Display information about all local digital certificate requests.

brief | detail

(Optional) Display the specified level of output.

certificate-id certificate-id-name

(Optional) Display information about only the specified local digital certificate request

Required Privilege Level


Output Fields

Table 1 lists the output fields for the show security pki certificate-request command. Output fields are listed in the approximate order in which they appear.

Table 1: show security pki certificate-request Output Fields

Field Name

Field Description

Level of Output

Certificate identifier

Name of the digital certificate.

All levels

Certificate version

Revision number of the digital certificate.


Issued to

Device that was issued the digital certificate.

none brief


Details of the digital certificate holder organized using the distinguished name format. Possible subfields are:

  • Common name—Name of the authority.

  • Organization—Organization of origin.

  • Organizational unit—Department within an organization.

  • State—State of origin.

  • Country—Country of origin.


Alternate subject

Domain name or IP address of the device related to the digital certificate.



Time period when the digital certificate is valid. Values are:

  • Not before—Time when the digital certificate becomes valid.

  • Not after—End time when the digital certificate becomes invalid.

All levels

Public key algorithm

Encryption algorithm used with the private key, such as rsaEncryption(1024 bits).

All levels

Public key verification status

Public key verification status: Failed or Passed. The detail output also provides the verification hash.

All levels


Secure Hash Algorithm (SHA1) and Message Digest 5 (MD5) hashes used to identify the digital certificate.


Use for key

Use of the public key, such as Certificate signing, CRL signing, Digital signature, or Key encipherment.


Sample Output

show security pki certificate-request

show security pki certificate-request detail

Release Information

Command introduced in Junos OS Release 7.5.