1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82
|
---
layout: default
built_from_commit: 70303b65ae864066c583e1436011ff135847f6ad
title: 'Man Page: puppet ssl'
canonical: "/puppet/latest/man/ssl.html"
---
# Man Page: puppet ssl
> **NOTE:** This page was generated from the Puppet source code on 2024-08-29 17:41:46 -0700
## NAME
**puppet-ssl** - Manage SSL keys and certificates for puppet SSL clients
## SYNOPSIS
Manage SSL keys and certificates for SSL clients needing to communicate
with a puppet infrastructure.
## USAGE
puppet ssl *action* \[-h\|\--help\] \[-v\|\--verbose\] \[-d\|\--debug\]
\[\--localca\] \[\--target CERTNAME\]
## OPTIONS
- \--help: Print this help message.
- \--verbose: Print extra information.
- \--debug: Enable full debugging.
- \--localca Also clean the local CA certificate and CRL.
- \--target CERTNAME Clean the specified device certificate instead of
this host\'s certificate.
## ACTIONS
bootstrap
: Perform all of the steps necessary to request and download a client
certificate. If autosigning is disabled, then puppet will wait every
**waitforcert** seconds for its certificate to be signed. To only
attempt once and never wait, specify a time of 0. Since
**waitforcert** is a Puppet setting, it can be specified as a time
interval, such as 30s, 5m, 1h.
submit_request
: Generate a certificate signing request (CSR) and submit it to the
CA. If a private and public key pair already exist, they will be
used to generate the CSR. Otherwise, a new key pair will be
generated. If a CSR has already been submitted with the given
**certname**, then the operation will fail.
generate_request
: Generate a certificate signing request (CSR). If a private and
public key pair exist, they will be used to generate the CSR.
Otherwise a new key pair will be generated.
download_cert
: Download a certificate for this host. If the current private key
matches the downloaded certificate, then the certificate will be
saved and used for subsequent requests. If there is already an
existing certificate, it will be overwritten.
verify
: Verify the private key and certificate are present and match, verify
the certificate is issued by a trusted CA, and check revocation
status.
clean
: Remove the private key and certificate related files for this host.
If **\--localca** is specified, then also remove this host\'s local
copy of the CA certificate(s) and CRL bundle. if **\--target
CERTNAME** is specified, then remove the files for the specified
device on this host instead of this host.
show
: Print the full-text version of this host\'s certificate.
|