Specifications

Creating Keys and Certificates
16-8 Managing Keys and Certificates
Installing a Key Pair and Certificate from a PKCS #12 Object File
PKCSobjectfilesprovideafileformatforstoringandtransferringstoringdataandcryptographic
information.(Formoreinformation,seePKCS #7,PKCS #10,andPKCS #12ObjectFileson
page 164.)APKCS #12objectfile,whichyouobtainfromaCA,includestheprivatekey,a
certificate,andoptionallytheCAsown
certificate.
AftertransferringthePKCS #12filefromtheCAviaFTPandgeneratingaonetimepasswordto
unlockit,youstorethefileintheRoamAboutswitch’scertificateandkeystore.
TosetandstoreaPKCS #12objectfile,followthesesteps:
1. CopythePKCS #12objectfiletononvolatilestorage
ontheRoamAboutswitch.Usethe
followingcommand:
copy tftp://filename local-filename
2. Enteraonetimepassword(OTP)tounlockthePKCS #12 objectfi le.Thepasswordmustbe
thesameasthe passwordprotectingthePKCS #12file.
Thepasswordmustcontainatleast1 alphanumericcharacter,withnospaces,andmustnot
includethefollowingcharacters:
•Quotationmarks(““)
•Questionmark(?)
•Ampersand(&)
Toenter
theonetimepassword,usethefollowingcommand:
crypto otp {admin | eap | web} one-time-password
3. UnpackthePKCS #12objectfileintothecertificateandkeystorageareaontheRoamAbout
switch.Usethefollowingcommand:
crypto pkcs12 {admin | eap | web} filename
ThefilenameisthelocationofthefileontheRoamAboutswitch.
Note: On a RoamAbout switch that handles communications to or from Microsoft Windows clients,
use a one-time password of 31 characters or fewer.
Note: MSS erases the OTP password entered with the crypto otp command when you enter the
crypto pkcs12 command.