Reference Guide
• 2 — Active Directory
• 3 — Public Key Cryptography Standards (PKCS) format
• -f — Species the source lename in the local le system of the certicate uploaded.
• -k — Species optional source lename for private key when using type 6.
• -p — Pass phrase for decrypting the PKCS12 le uploaded.
• -k — Filename of the private key le while using type 6. The private key is generated when the CSR is
generated. If the CSR is generated on another server, then it is necessary to upload the private key with the
certicate.
Output
racadm -r 192.168.0.2 -u root -p xxx sslcertupload -t 2 -f cert.txt
Certicate successfully uploaded to the RAC.
Example
• Uploading a server certicate.
racadm -r 192.168.0.2 -u root -p xxx sslcertupload -t 1 -f cert.txt
• Upload web server certicate and key
racadm -r 192.168.0.2 -u root -p xxx sslcertupload -t 6 -f cert.txt -k key.txt
• Uploading Active Directory Certicate
racadm -r 192.168.0.2 -u root -p xxx sslcertupload -t 2 -f ad_cert.txt
sslcertview
Description
Displays the SSL server or CA certicate that exists on iDRAC.
Synopsis
racadm sslcertview -t <type> [-A]
Input
• -t — Species the type of certicate to view, either the CA certicate or server certicate.
• 1=server certicate
• 2=Active Directory
• -A — Prevents printing headers or labels.
NOTE: If a certicate is generated using comma ‘,’ as one of the parameters for the Organization Name,
Common Name, Location Name, or State Name, then this command displays the partial name in the
respective elds only up to the comma. The rest of the string is not displayed.
Output
racadm sslcertview -t 1
Serial Number 01
Subject Information:
Country Code (CC) US
State (S) Texas
Locality (L) Round Rock
Organization (O) Dell Inc.
Organizational Unit (OU) Remote Access Group
RACADM Subcommand Details 75