Specifications
Creating Keys and Certificates
16-8 Managing Keys and Certificates
Installing a Key Pair and Certificate from a PKCS #12 Object File
PKCSobjectfilesprovideafileformatforstoringandtransferringstoringdataandcryptographic
information.(Formoreinformation,see“PKCS #7,PKCS #10,andPKCS #12ObjectFiles”on
page 16‐4.)APKCS #12objectfile,whichyouobtainfromaCA,includestheprivatekey,a
certificate,andoptionallytheCA’sown
certificate.
AftertransferringthePKCS #12filefromtheCAviaFTPandgeneratingaone‐timepasswordto
unlockit,youstorethefileintheRoamAboutswitch’scertificateandkeystore.
TosetandstoreaPKCS #12objectfile,followthesesteps:
1. CopythePKCS #12objectfiletononvolatilestorage
ontheRoamAboutswitch.Usethe
followingcommand:
copy tftp://filename local-filename
2. Enteraone‐timepassword(OTP)tounlockthePKCS #12 objectfi le.Thepasswordmustbe
thesameasthe passwordprotectingthePKCS #12file.
Thepasswordmustcontainatleast1 alphanumericcharacter,withnospaces,andmustnot
includethefollowingcharacters:
•Quotationmarks(““)
•Questionmark(?)
•Ampersand(&)
Toenter
theone‐timepassword,usethefollowingcommand:
crypto otp {admin | eap | web} one-time-password
3. UnpackthePKCS #12objectfileintothecertificateandkeystorageareaontheRoamAbout
switch.Usethefollowingcommand:
crypto pkcs12 {admin | eap | web} filename
ThefilenameisthelocationofthefileontheRoamAboutswitch.
Note: On a RoamAbout switch that handles communications to or from Microsoft Windows clients,
use a one-time password of 31 characters or fewer.
Note: MSS erases the OTP password entered with the crypto otp command when you enter the
crypto pkcs12 command.