This resource address creates a new certificate authority in the security database.
URL Parameters | |
---|---|
format | The format of the posted data. Can be either
html , json , or xml (default). This value overrides
the Accept header if both are present. |
Upon success, MarkLogic Server returns status code 201 (Created). If the certificate authority already exists or if the payload is malformed, a status code of 400 (Bad Request) is returned. A status code of 401 (Unauthorized) is returned if the user does not have the necessary privileges.
manage-admin
and security
rolehttp://marklogic.com/xdmp/privileges/manage
http://marklogic.com/xdmp/privileges/manage-admin
http://marklogic.com/xdmp/privileges/get-user
cat certificate-authority.crt ==> <pki:certificate xmlns:pki="http://marklogic.com/xdmp/pki"> <pki:template-id>6264653696899042645</pki:template-id> <pki:certificate-id>11056419645740622001</pki:certificate-id> <pki:template-version>1</pki:template-version> <pki:temporary>true</pki:temporary> <pki:authority>true</pki:authority> <pki:host-name>mycert Certificate Authority</pki:host-name> <pki:pem> -----BEGIN CERTIFICATE----- MIIDPDCCAiSgAwIBAgIJAN+vzvihAy+IMA0GCSqGSIb3DQEBCwUAMDsxEjAQBgNV BAoMCU1hcmtMb2dpYzElMCMGA1UEAwwcbXljZXJ0IENlcnRpZmljYXRlIEF1dGhv cml0eTAeFw0xNDA5MTcyMTU5MDJaFw0xNTA5MTcyMTU5MDJaMDsxEjAQBgNVBAoM CU1hcmtMb2dpYzElMCMGA1UEAwwcbXljZXJ0IENlcnRpZmljYXRlIEF1dGhvcml0 eTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAzX1vdjgcV2/j5FNH/ G5oDNqJupIjjxKJb9AqY6+Gf5m45sDRhz2bTuyqJUzipLei0xQKn901ZSMSCO7yW 1KFy4hbxtVYy9i4LEcTreY48xU7Fu5Hi2Qi6foP69D0gzYI3WW9oBpp4B5oTnDyX XBariEbF4xl00wI9EQ1UEuriMX1EFwtr3Fa0srQN7NahPLSwbUx9yU2EjdHPaKez vEd8LN8POuE2OzZshDY4GPl6EY6SG990NykU+SZxLMBpRFQ1YpWDgNe1Zcjyu2VW Ai4x1pu6gUO/mquBPsbCl8Ujyl/jAbNlVncbsDFkAQZG9Qhz4AS8HxCW5pVNYZx1 dD0CAwEAAaNDMEEwDAYDVR0TBAUwAwEB/zALBgNVHQ8EBAMCAQYwEQYJYIZIAYb4 QgEBBAQDAgZAMBEGA1UdDgQKBAgky7mtT1Fl8DANBgkqhkiG9w0BAQsFAAOCAQEA jiv0UpoSAl5MZStWenzVMOyeRjJhkzU1/cjurQxIYcRqVHhlZ3S1kbW4sBxzIJQQ GzfmJYrNVX9u9f2B2W2FAbU77MBSqMYpmClNlcAniAVQiMI54vs6KkZU5YSd7TWM WxkCi7WqfxqGCZKZZOHweKccjA7BVLX3qK/VdYd9n2RxZg3cOwLe/bOmQj6Pd4yB Mq0u+dfZHzBYJseRVZLfyhZwk7XYSy6fYsHwsXmwjUFKuJmXPoSdT405yjTvtnoT 516FwCM2u8w2MRdvVquQfrSaTlFPy7R0qxh7SJclCvKgRkPNPc4LT34DjSUJ5k45 nZeJYELOLG9St3pmvnbRyQ== -----END CERTIFICATE----- </pki:pem> <cert xmlns="http://marklogic.com/xdmp/x509"> <version>2</version> <serialNumber>DFAFCEF8A1032F88</serialNumber> <signatureType>sha256WithRSAEncryption</signatureType> <issuer> <organizationName>MarkLogic</organizationName> <commonName>mycert Certificate Authority</commonName> </issuer> <validity> <notBefore>2014-09-17T21:59:02Z</notBefore> <notAfter>2015-09-17T21:59:02Z</notAfter> </validity> <subject> <organizationName>MarkLogic</organizationName> <commonName>mycert Certificate Authority</commonName> </subject> <publicKey> -----BEGIN PUBLIC KEY----- MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwDNfW92OBxXb+PkU0f8b mgM2om6kiOPEolv0Cpjr4Z/mbjmwNGHPZtO7KolTOKkt6LTFAqf3TVlIxII7vJbU oXLiFvG1VjL2LgsRxOt5jjzFTsW7keLZCLp+g/r0PSDNgjdZb2gGmngHmhOcPJdc FquIRsXjGXTTAj0RDVQS6uIxfUQXC2vcVrSytA3s1qE8tLBtTH3JTYSN0c9op7O8 R3ws3w864TY7NmyENjgY+XoRjpIb33Q3KRT5JnEswGlEVDVilYOA17VlyPK7ZVYC LjHWm7qBQ7+aq4E+xsKXxSPKX+MBs2VWdxuwMWQBBkb1CHPgBLwfEJbmlU1hnHV0 PQIDAQAB -----END PUBLIC KEY----- </publicKey> <v3ext> <basicConstraints critical="false">CA:TRUE</basicConstraints> <keyUsage critical="false">Certificate Sign, CRL Sign</keyUsage> <nsCertType critical="false">SSL Server</nsCertType> <subjectKeyIdentifier critical="false">24:CB:B9:AD:4F:51:65:F0</subjectKeyIdentifier> </v3ext> </cert> </pki:certificate> curl -X POST --anyauth --user admin:admin --header "Content-Type:text/plain" \ -d@certificate-authority.crt http://localhost:8002/manage/v2/certificate-authorities => Creates a new certificate authority in the security database.