Updates the status of x509 fingerprint(s) associated with an existing DAL Target to active/inactive.
java -jar skfsadminclient.jar UDFP <hostport> <did> <wsprotocol> <authtype> <svcusername> <svcpassword> <tid> <sha256fp(s)> <status>
Value |
Explanation |
---|---|
hostport |
Host and port to access the FIDO server |
did |
Unique domain identifier that belongs to SKCE |
wsprotocol |
Web service protocol; REST | SOAP |
authtype |
Authentication type; PASSWORD |
svcusername |
Username used for PASSWORD-based authorization |
svcpassword |
Password used for PASSWORD-based authorization |
tid |
Unique ID for the DAL target |
sha256fp(s) |
comma separated list of sha256 fingerprint(s) |
status |
status that should be set for the sha256 fingerprint. Values: active | inactive |
java -jar skfsadminclient.jar UDFP https://example.strongkey.com:8181 1 REST password fidoadminuser Abcd1234! 1 kffL-daBUxvHpY-4M8yhTavt5QnFEI2LsexohxrGPYU,s2gOGvzwTA5UocPSiF_kzVqt00E50Gz364J6aRsXpGM inactive
Copyright (c) 2001-2025 StrongAuth, Inc. All rights reserved.
REST Update X509 Fingerprints information with password
******************************************
{"svcinfo":{"did":1,"protocol":"FIDO2_0","authtype":"PASSWORD","svcusername":"fidoadminuser","svcpassword":"Abcd1234!"},"operation":"updatex509fingerprint","payload":{"tid":1,"certificateEntries":[{"x509CertificateFingerprint":"kffL-daBUxvHpY-4M8yhTavt5QnFEI2LsexohxrGPYU","status":"inactive"},{"x509CertificateFingerprint":"s2gOGvzwTA5UocPSiF_kzVqt00E50Gz364J6aRsXpGM","status":"inactive"}]}}
Calling update x509 certificate @ https://example.strongkey.com:8181/skfs/rest/dal
Update DAL x509 Fingerprint complete.
******************************************
Add update x509 fingerprint response : {"Response":"successfully updated valid DAL fingerprint(s)","responseCode":"FIDO-MSG-0098","skfsVersion":"4.16.0","skfsFQDN":"example.strongkey.com","TXID":"1-1-70-1745527704168"}
Done with Update DAL x509 Fingerprint!