source: doc/creddy.1 @ 2485307

mei_rt2mei_rt2_fix_1
Last change on this file since 2485307 was ba6027a, checked in by Mei <mei@…>, 12 years ago

1) modified code all around to add support for encrypted private key for

ID credential

2) add new abac_key_t structure (abac_key.c)
3) add new keycheck option to creddy
4) add 2 new test suites

  • Property mode set to 100644
File size: 5.3 KB
Line 
1.TH creddy 1 "July 2012" "ABAC 0.2.2"
2
3.SH NAME
4creddy \- ABAC X.509 identity and attribute certificate manager
5
6.SH SYNOPSIS
7
8.B creddy [ --<mode> ] --help
9
10.SH DESCRIPTION
11
12creddy is an awesome and wonderful ABAC credential management tool. It
13creates, verifies, and otherwise frobnicates X.509 identity and
14attribute certificates. The output of the tool is suitable for use with
15ABAC. Additionally, the self-signed X.509 identity certs (with
16associated private keys) can be used with OpenSSL
17
18.SH OPTIONS
19
20.SS --generate
21Generate an X.509 identity cert and private key pair unless an external private key is specified. The certificate is saved in ${cn}_id.pem and the generated private key is saved in ${cn}_private.pem
22
23.P
24Note that private key generation is slow and uses a lot of entropy. You can generate entropy by moving your mouse a lot or running large find commands on your local file systems
25
26.TP
27.B --cn
28common name used on certificate, provided as a convenience and ignored by ABAC
29
30.TP
31.B --validity
32optional certificate validity. This argument takes a time period followed by an optional suffix of s m h d y (defaults to d if omitted). The default is 1080 days
33
34.TP
35.B --out
36optional output directory. Must exist before invoking the command
37
38.TP
39.B --key
40optional external private key to be use for this identity
41
42.TP
43.B --p
44optional passphrase flag if the external private key supplied is encrypted. If the passphrase
45is saved in a file 'pfile', then --p=pfile
46
47.SS --verify
48verify the signature on a self-signed X.509 identity cert or an X.509 attribute cert
49
50.TP
51.B --cert
52self-signed X.509 identity cert
53
54.TP
55.B --attrcert
56optional X.509 attribute cert. If omitted the self-signature of the ID cert is checked
57
58.SS --keyid
59extract the subjectKeyIdentifier (SHA1 hash) from an X.509 identity cert
60
61.TP
62.B --cert
63X.509 identity cert
64
65.SS --attribute
66generate an X.509 attribute cert representing an ABAC credential
67
68An attribute cert has one or more subjects. A single subject may be defined without a role or oset. Otherwise, subjects are defined by a pair of a --subject-{cert,id} and --subject-{role,oset} and may include an optional --subject-link or just --subject-obj or --subject-cert. Providing multiple subjects creates an intersection certificate
69
70.TP
71.B --issuer
72X.509 identity cert issuing the credential
73
74.TP
75.B --key
76private key associated with issuer cert
77
78.TP
79.B --p
80optional passphrase if the private key is encrypted
81
82.TP
83.B --role
84role in issuer's local attribute space
85
86.TP
87.B --oset
88o-set in issuer's local attribute space
89
90.TP
91.B --subject-cert
92X.509 identity cert representing the principal to which the role is being issued. This fulfills the same purpose as --subject-id and should only be used once per subject
93
94.TP
95.B --subject-id
96public key identifier (SHA1 hash) of the principal to which the role is being issued. This fulfills the same purpose as --subject-cert and should only be used once per subject
97
98.TP
99.B --subject-role
100optional role in subject's local attribute space. If the issuer is A, role is r1, subject is B, and subject-role is r2, the attribute issued will be A.r1 <- B.r2
101
102.TP
103.B --subject-oset
104optional oset in subject's local attribute space. If the issuer is A, oset is o1, subject is B, and subject-oset is o2, the attribute issued will be A.o1 <- B.o2
105
106.TP
107.B --subject-link
108optional linking role in subject's local attribute space. If the issuer is A, oset is o1, subject is B, subject-link is r2 and subject-oset is o2, the attribute issued will be A.o1 <- B.r2.o2
109
110.TP
111.B --subject-obj
112optional object in subject's local attribute space. If the issuer is A, oset is o1, and subject-obj is o2, the attribute issued will be A.o1 <- o2
113
114.TP
115.B --validity
116optional certificate validity. This argument takes a time period followed by an optional suffix of s m h d y (defaults to d if omitted). The default is 365 days
117
118.TP
119.B --out
120where to save DER-encoded attribute cert. In order to interoperate with the rest of ABAC, this name should end in _attr.der
121
122.SS --keycheck
123Do a sanity check on a private key file
124
125.TP
126.B --key
127private key to be used
128
129.TP
130.B --p
131private key to be used
132
133.SS --roles
134Extract the roles from an X.509 attribute cert
135
136.SS --osets
137Extract the osets from an X.509 attribute cert
138
139.TP
140.B --cert
141X.509 attribute cert containing ABAC roles
142
143.SS --display
144Displays metadata from an X.509 identity or attribute cert
145
146.TP
147.B --show=[issuer,..,all]
148comma-separated list of:
149
150    issuer      DN of issuer
151    subject     DN of subject
152    validity    validity period
153    roles       attribute cert roles (fails silently on ID certs)
154    osets       attribute cert osets (fails silently on ID certs)
155    all         all of the above
156
157.TP
158.B --cert
159X.509 identity or attribute cert
160
161.SS --version
162display ABAC/creddy version
163
164.SH EXAMPLES
165
166.TP
167Generate ID cert and private key pairs:
168
169.B creddy --generate --cn Alice
170.br
171.B creddy --generate --cn Bob
172
173.TP
174Issue the credential Alice.friend <- Bob
175
176creddy --attribute \\
177       --issuer Alice_ID.pem --key Alice_private.pem \\
178       --role friend --subject-cert Bob_ID.pem \\
179       --out Alice_friend__Bob_attr.der
180
181.SH AUTHOR
182
183Written by Mike Ryan
184Updated by Mei-Hui Su <mei@ISI.EDU>. 
185
186.SH BUGS
187
188None yet. Report to http://abac.deterlab.net/
189
190.SH COPYRIGHT
191
192Copyright (c) 2010-2012 USC/ISI. Released under MIT license. See COPYING included with source for details.
Note: See TracBrowser for help on using the repository browser.