CREATE CERTIFICATE
Creates or imports a certificate, Certificate Authority (CA), or intermediate CA. These certificates can be used with ALTER TLS CONFIGURATION to set up client-server TLS, LDAPLink TLS, LDAPAuth TLS, and internode TLS.
CREATE CERTIFICATE generates x509v3 certificates.
Syntax
CREATE [TEMP[ORARY]] [CA] CERTIFICATE certificate_name
{AS cert [KEY key_name]
| SUBJECT subject
[ SIGNED BY ca_cert ]
[ VALID FOR days ]
[ EXTENSIONS ext = val[,...] ]
[ KEY private_key ]}
Parameters
TEMPORARY- Create with session scope. The key is stored in memory and is valid only for the current session.
CA- Designates the certificate as a CA or intermediate certificate. If omitted, the operation creates a normal certificate.
certificate_name- The name of the certificate.
AScert- The imported certificate (string).
This parameter should include the entire chain of certificates, excluding the CA certificate.
KEYkey_name- The name of the key.
This parameter only needs to be set for client/server certificates and CA certificates that will be used to sign other certificates in OpenText™ Analytics Database. If your imported CA certificate is only for validating other certificates, you do not need to specify a key.
SUBJECTsubject- The entity to issue the certificate to (string).
SIGNED BYca_cert- The name of the CA that signed the certificate.
When adding a CA certificate, this parameter is optional. Specifying it will create an intermediate CA that cannot be used to sign other CA certificates.
When creating a certificate, this parameter is required.
VALID FORdays- The number of days that the certificate is valid.
EXTENSIONSext=val- Strings specifying certificate extensions. For a full list of extensions, see the OpenSSL documentation.
KEYprivate_key- The name of the certificate's private key.
When importing a certificate, this parameter is required.
Privileges
Superuser
Default extensions
CREATE CERTIFICATE generates x509v3 certificates and includes several extensions by default. These differ based on the type of certificate you create:
CA Certificate:
-
'basicConstraints' = 'critical, CA:true' -
'keyUsage' = 'critical, digitalSignature, keyCertSign' -
'nsComment' = Vertica generated [CA] certificate' -
'subjectKeyIdentifier' = 'hash'
Certificate:
-
'basicConstraints' = 'CA:false' -
'keyUsage' = 'critical, digitalSignature, keyEncipherment'
Examples
See Generating TLS certificates and keys.