Adds a list of x509 certificate(s) and fingerprint(s) to an existing DAL target.
java -jar skfsadminclient.jar ADFP <hostport> <did> <wsprotocol> <authtype> <svcusername> <svcpassword> <tid> <x509cert1>:<sha256fp1>,<x509cert2>:<sha256fp2>...
Value |
Explanation |
---|---|
hostport |
Host and port to access the FIDO server |
did |
Unique domain identifier that belongs to SKCE |
wsprotocol |
Web service protocol; REST | SOAP |
authtype |
Authentication type; PASSWORD |
svcusername |
Username used for PASSWORD-based authorization |
svcpassword |
Password used for PASSWORD-based authorization |
tid |
Unique ID for the DAL target |
x509cert:sha256fp |
X509 certificate for the app followed by colon followed by SHA256 fingerprint of the app's signing certificate (X509 certificate is optional in SKFS build 4.16) |
$ example:~/skfsclient> java -jar skfsadminclient.jar ADFP https://example.strongkey.com:8181 1 REST password fidoadminuser Abcd1234! 1 :s2gOGvzwTA5UocPSiF_kzVqt00E50Gz364J6aRsXpGM
Copyright (c) 2001-2025 StrongAuth, Inc. All rights reserved.
REST Add X509 Fingerprints information with password
******************************************
{"svcinfo":{"did":1,"protocol":"FIDO2_0","authtype":"PASSWORD","svcusername":"fidoadminuser","svcpassword":"Abcd1234!"},"operation":"addx509fingerprint","payload":{"tid":1,"certificateEntries":[{"x509Certificate":"","x509CertificateFingerprint":"s2gOGvzwTA5UocPSiF_kzVqt00E50Gz364J6aRsXpGM"}]}}
Calling add x509 certificate @ https://example.strongkey.com:8181/skfs/rest/dal
Add DAL x509 Fingerprint complete.
******************************************
Add dal x509 fingerprint response : {"Response":"successfully added valid DAL fingerprint(s): [s2gOGvzwTA5UocPSiF_kzVqt00E50Gz364J6aRsXpGM]","responseCode":"FIDO-MSG-0096","skfsVersion":"4.16.0","skfsFQDN":"example.strongkey.com","TXID":"1-1-72-1745527529737"}
Done with Add DAL x509 Fingerprint!