Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

EMC® VNX® Series Security Configuration Guide for VNX

PDF

Send the certificate request to the CA

About this task

If you are using an external CA to sign the certificate, a request to sign the public key is automatically generated along with the public/private key set. You must then send the certificate request to the CA.

NOTE: This task is not required if you are using the Control Station to sign the certificate. The Control Station automatically receives the certificate request.

Steps

  1. Display the persona’s properties to verify the content of the certificate request by using this command syntax:
    $ server_certificate<movername>-persona -info{-all| <persona_name>| id=<persona_id>}

    where:

    <movername> = name of the physical Data Mover with which the persona is associated.

    <persona_name> = name of the persona.

    <persona_id> = ID of the persona. The ID is generated when the persona is created.

    Example:

    To display the properties for the default persona, including the certificate request, type:

    $ server_certificate server_2 -persona -info default

    Output:

    server_2 : 
    id=1
    name=default
    next state=Request Pending 
    next certificate: 
    request subject = CN=name;CN=1.2.3.4
    request: 
    -----BEGIN CERTIFICATE REQUEST-----
    MIIB6TCCAVICAQYwDQYJKoZIhvcNAQEEBQAwWzELMAkGA1UEBhMCQVUxEzARBgNV
    BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYD
    VQQDExJUZXN0IENBICgxMDI0IGJpdCkwHhcNMDAxMDE2MjIzMTAzWhcNMDMwMTE0
    MjIzMTAzWjBjMQswCQYDVQQGEwJBVTETMBEGA1UECBMKUXVlZW5zbGFuZDEaMBgG
    A1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxIzAhBgNVBAMTGlNlcnZlciB0ZXN0IGNl
    cnQgKDUxMiBiaXQpMFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAJ+zw4Qnlf8SMVIP
    Fe9GEcStgOY2Ww/dgNdhjeD8ckUJNP5VZkVDTGiXav6ooKXfX3j/7tdkuD8Ey2//
    Kv7+ue0CAwEAATANBgkqhkiG9w0BAQQFAAOBgQCT0grFQeZaqYb5EYfk20XixZV4
    GmyAbXMftG1Eo7qGiMhYzRwGNWxEYojf5PZkYZXvSqZ/ZXHXa4g59jK/rJNnaVGM
    k+xIX8mxQvlV0n5O9PIha5BX5teZnkHKgL8aKKLKW1BK7YTngsfSzzaeame5iKfz
    itAE+OjGF+PFKbwX8Q==
    -----END CERTIFICATE REQUEST-----
  2. If you have not already done so, save the certificate request to a file (for example, server_2.1.request.pem).
  3. Send the .pem file to the CA using that company’s website or email.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\