CLI Reference - Certificates
This section outlines the CLI commands relevant to SSH and PKI certificates.
General Flags
--profile, --token: Use a specific profile (located at $HOME/.akeyless/profiles) or a temporary access token
--uid-token: The universal identity token, required only for universal_identity authentication
-h, --help: Display help information
--json[=false]: Set the output format to JSON
--jq-expression: Provide a jQuery expression to filter result output
--no-creds-cleanup[=false]: Do not clean local temporary expired credentials
SSH Certificates
create-ssh-cert-issuer
create-ssh-cert-issuerCreates a new SSH certificate issuer
Usage
akeyless create-ssh-cert-issuer \
--name <SSH certificate issuer name> \
--signer-key-name <A key to sign the certificate with> \
--allowed-users <Users allowed to fetch the certificate> \
--ttl <Time To Live for the certificate>Flags
-n, --name: Required, SSH certificate issuer name
-s, --signer-key-name: Required, A key to sign the certificate with
-a, --allowed-users: Required, List of allowed users who can use the certificate, for example, ubuntu
-t, --ttl: Required, The requested Time To Live for the certificate, in seconds
-p, --principals: Signed certificates with principal, for example, example_role1,example_role2
-x, --extensions: Signed certificates with extensions, for example, permit-port-forwarding="true"
--host-provider[=explicit]: Host provider type [explicit/target]
-m, --metadata: A metadata about the issuer
--secure-access-enable: Enable/Disable Secure Remote Access, [true/false]
--secure-access-bastion-api: Bastion's SSH control API endpoint. For example, https://my.bastion:9900
--secure-access-bastion-ssh: Bastion's SSH server. For example, my.bastion:22
--secure-access-ssh-creds-user: SSH username to connect to target server, must be in 'Allowed Users' list
--secure-access-host: Target servers for connections. For multiple values repeat this flag.
--external-username[=false]: Use externally provided username mode for Secure Remote Access.
--fixed-user-claim-keyname[=ext_username]: For externally provided users, the IdP claim key name to extract the username from. Relevant only when --external-username=true.
--secure-access-use-internal-bastion: Use internal SSH Bastion - Relevant only for Secure Remote Access Deployment, mostly when using Dockers. Set the relevant IP address of the SSH Bastion for internal communication between ZT and SSH bastions.
--delete-protection: Protection from accidental deletion of this item, [true/false]
get-ssh-certificate
get-ssh-certificateGenerate SSH certificate using Akeyless certificate issuer
Usage
akeyless get-ssh-certificate \
--cert-username <Username to sign> \
--cert-issuer-name <The name of the SSH certificate issuer> \
--public-key-file-path <path/to/SSH public key> \
--public-key-data <key file contents>Flags
-s, --cert-username: Required, The username to sign in the SSH certificate (use a comma-separated list for more than one username)
-c, --cert-issuer-name: Required, The name of the SSH certificate issuer
-p, --public-key-file-path: SSH public key
-o, --outfile: Output file path with the certificate. If not provided, and public-key-file-path used, the file with the certificate will be created in the same location of the provided public key with the -cert extension
--public-key-data: SSH public key file contents. If this option is used, the certificate will be printed to stdout
-t, --ttl: Updated certificate lifetime in seconds (must be less than the Certificate Issuer default TTL)
--legacy-signing-alg-name[=false]: Set this option to use the legacy signing algorithm [email protected].
update-ssh-cert-issuer
update-ssh-cert-issuerUpdates an existing SSH certificate issuer
Usage
akeyless update-ssh-cert-issuer \
--name <SSH cert issuer name> \
--signer-key-name <A key to sign the certificate with> \
--allowed-users <Users allowed to fetch the certificate> \
--ttl <Time To Live for the certificate>Flags
-n, --name: Required, SSH certificate issuer name
--new-name: New item name
-s, --signer-key-name: Required, A key to sign the certificate with
-a, --allowed-users: Required, List of allowed users who can use the certificate, for example, ubuntu
-t, --ttl: Required, The requested Time To Live for the certificate, in seconds.
-p, --principals: Signed certificates with principal, for example, example_role1,example_role2
-x, --extensions: Signed certificates with extensions, for example, permit-port-forwarding="true"
--host-provider[=explicit]: Host provider type [explicit/target]
-m, --metadata: A metadata about the issuer
--add-tag: List of the new tags that will be attached to this item. To specify multiple tags use argument multiple times: --add-tag Tag1 --add-tag Tag2
--rm-tag: List of the existent tags that will be removed from this item. To specify multiple tags use argument multiple times: --rm-tag Tag1 --rm-tag Tag2
--secure-access-enable: Enable/Disable Secure Remote Access, [true/false]
--secure-access-bastion-api: Bastion's SSH control API endpoint. For example, https://my.bastion:9900
--secure-access-bastion-ssh: Bastion's SSH server. For example, my.bastion:22
--secure-access-ssh-creds-user: SSH username to connect to target server, must be in 'Allowed Users' list
--secure-access-host: Target servers for connections. For multiple values repeat this flag
--external-username[=false]: Use externally provided username mode for Secure Remote Access.
--fixed-user-claim-keyname[=ext_username]: For externally provided users, the IdP claim key name to extract the username from. Relevant only when --external-username=true.
--secure-access-use-internal-bastion: Use internal SSH Bastion
PKI Certificates
create-pki-cert-issuer
create-pki-cert-issuerCreates a new PKI certificate issuer
Usage
akeyless create-pki-cert-issuer \
--name <PKI issuer name> \
--ttl <The maximum requested Time To Live for issued certificates, in seconds> \
--signer-key-name <A signer key to sign and issue certificate> Flags
-n, --name: Required, PKI certificate issuer name
--ca-target: The name of an existing CA target (For example, GlobalSign,GoDaddy,ZeroSSL) to attach this PKI Certificate Issuer, Relevant only when using Public CA.
-s, --signer-key-name: A key to sign the issued certificates.
--gw-cluster-url: The GW cluster URL, Relevant for Public CA and CRL.
-t, --ttl: Required, The maximum requested Time To Live for the issued certificate by default in seconds, supported formats are s, m, h, d.
--allowed-domains: A list of domains (comma-separated) this Issuer is allowed to issue certificates for.
--allowed-uri-sans: A list of allowed URI Subject Alternative Names (comma-separated) this Issuer is allowed to issue certificates for.
--allow-subdomains [=false]: If set, clients can request certificates for subdomains and wildcard subdomains of the allowed domains
--not-enforce-hostnames [=false]: If set, any names are allowed for CN and SANs in the certificate and not only a valid host name
--allow-any-name [=false]: If set, clients can request certificates for any CN
--allowed-ip-sans: A list of the allowed CIDRs for ips that clients can request to be included in the certificate as part of the IP Subject Alternative Names (in a comma-delimited list)
--not-require-cn [=false]: If set, clients can request certificates without a CN.
--server-flag [=false]: Extended Key Usage field If set, certificates will be flagged for server auth.
--client-flag [=false]: Extended Key Usage field If set, certificates will be flagged for client auth use.
--code-signing-flag [=false]: Extended Key Usage field If set, certificates will be flagged for code signing use.
--key-usage[=DigitalSignature,KeyAgreement,KeyEncipherment]: A list of Key Usage flags
--critical-key-usage[=true]: Mark key usage as critical [true/false]
--organization-units: A comma-separated list of organizational units (OU) that will be set in the issued certificate.
--organizations: A comma-separated list of organizations (O) that will be set in the issued certificate.
--country: A comma-separated list of the country that will be set in the issued certificate.
--locality: A comma-separated list of the locality that will be set in the issued certificate.
--province: A comma-separated list of the province that will be set in the issued certificate.
--street-address: A comma-separated list of the street address that will be set in the issued certificate.
--postal-code: A comma-separated list of the postal code that will be set in the issued certificate.
--destination-path: A path in Akeyless to store the generated certificates for future provisioning, renewals and expiration events.
--protect-certificates: Whether to protect generated certificates from deletion
--is-ca [=false]: If set, the basic constraints extension will be added to the issued certificate
--max-path-len[=-1]: The maximum path length for the generated certificate. -1, means unlimited
--enable-acme: If set, the cert issuer will support the ACME protocol
-e, --expiration-event-in: How many days before the expiration of the certificate would you like to be notified, To specify multiple events, use the argument multiple times: --expiration-event-in 1 --expiration-event-in 5
--allowed-extra-extensions: A JSON string that defines the allowed extra extensions for the PKI cert issuer, for example, '{"<OID>":["<Value>"]}'
--allowed-extra-extensions-file-path: A path to a file containing a JSON string that defines the allowed extra extensions for the PKI cert issuer
--allow-copy-ext-from-csr: If set, will allow copying the extra extensions from the CSR file (if given)
--create-public-crl: Set this to allow the cert issuer will expose a public CRL endpoint
--create-private-crl: Set this to allow the issuer will expose a CRL endpoint in the Gateway
--create-private-ocsp: Set this to enable an OCSP endpoint in the Gateway and include its URL in AIA
--create-public-ocsp: Set this to enable a public OCSP endpoint and include its URL in AIA (served by UAM and includes account id)
--auto-renew: Automatically renew certificates before expiration
--scheduled-renew: Number of days before expiration to renew certificates
--disable-wildcards[=false]: If set, generation of wildcard certificates will be disabled
--description: Description of the object
--delete-protection: Protection from accidental deletion of this item, [true/false]
--tag: List of the tags attached to this key. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2
generate-csr
generate-csrGenerates a new Certificate Signing Request (CSR)
Usage
akeyless generate-csr \
--name <Key Name> \
--common-name <Common Name> Flags
-n, --name: Required, Full path to the Key that will sign the CSR
-g, --generate-key: Use this flag to generate a new classic key to sign the CSR - A name must be specified for the new key
-k, --key-type[=classic-key]: The type of the key to generate (classic-key/dfc)
--export-private-key[=false]: If set the private key will be provided with the CSR.
-a, --alg: Algorithm to use for generating the new key (RSA1024, RSA2048, RSA3072, RSA4096, EC256, EC384)
--hash-algorithm[=SHA256]: Specifies the hash algorithm used for the encryption key's operations, available options: [SHA256, SHA384, SHA512] (only for RSA and EC keys)
-c, --common-name: Required, common name to be included in the CSR certificate
--certificate-type: certificate type to be included in the CSR certificate (ssl-client/ssl-server/certificate-signing)
--critical: add critical to the key usage extension (will be false if not added)
--org: organization to be included in the CSR
--dep: department to be included in the CSR
--city: city to be included in the CSR
--state: state to be included in the CSR
--country: country to be included in the CSR
--alt-names: a comma-separated list of DNS alternative names
--email-addresses: a comma-separated list of email addresses alternative names
--ip-addresses: a comma-separated list of IP addresses alternative names
--uri-sans: a comma-separated list of URI alternative names
-u, --gateway-url[=http://localhost:8000]: API Gateway URL http://Your-Akeyless-Gateway-URL:8000
--description: Description of the object
get-kube-exec-creds
get-kube-exec-credsGets credentials for authentication with Kubernetes cluster based on a PKI Cert Issuer
Usage
akeyless get-kube-exec-creds \
--cert-issuer-name <PKI cert issuer name> \
--key-file-path <The client public or private key file path> \
--alt-names <The Subject Alternative Names to be included in the PKI certificate> \
--ttl <Updated certificate lifetime in seconds>Flags
-c, --cert-issuer-name: Required, The name of the PKI certificate issuer.
-k, --key-file-path: The client public or private key file path (if it is a private key, it will be used to extract the public key)
--key-data-base64: PKI key file contents encoded using Base64. If this option is used, the certificate will be printed to stdout
--csr-file-path: Path to Certificate Signing Request file to generate the certificate with
--csr-data-base64: Certificate Signing Request contents encoded in Base64 to generate the certificate with (if --csr-file-path is provided this flag is ignored)
--common-name: The common name to be included in the PKI certificate.
--alt-names: The Subject Alternative Names to be included in the PKI certificate (in a comma-delimited list).
--uri-sans: The URI Subject Alternative Names to be included in the PKI certificate (in a comma-delimited list).
-t, --ttl: Updated certificate lifetime in seconds (must be less than the Certificate Issuer default TTL)
-e, --extended-key-usage: A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: clientauth, serverauth.
-o, --outfile: Output file path with the certificate. If not provided, the file with the certificate will be created in the same location of the provided public key with the -cert extension
-a, --api-version[=v1]: The version of the client authentication API
get-pki-certificate
get-pki-certificateGenerates PKI certificate from a PKI Issuer
Usage
akeyless get-pki-certificate \
--cert-issuer-name <PKI issuer name> \
--key-file-path <client Key> \
--ttl <certificate lifetime> Flags
-c, --cert-issuer-name: Required, The name of the PKI certificate issuer.
-k, --key-file-path: The client public or private key file path (if it is a private key, it will be used to extract the public key). When using CSR with a private key, the provided key will be stored with the issued certificate.
--key-data-base64: PKI key file contents encoded using Base64. If this option is used, the certificate will be printed to stdout
--csr-file-path: Path to Certificate Signing Request file to generate the certificate with
--csr-data-base64: Certificate Signing Request contents encoded in Base64 to generate the certificate with (if --csr-file-path is provided this flag is ignored)
--common-name: The common name to be included in the PKI certificate
--alt-names: The Subject Alternative Names to be included in the PKI certificate (in a comma-delimited list)
--uri-sans: The URI Subject Alternative Names to be included in the PKI certificate (in a comma-delimited list)
-t, --ttl: Updated certificate lifetime (must be less than the Certificate Issuer default TTL). Default in seconds, supported formats are s, m, h, d
-e, --extended-key-usage: A comma-separated list of extended key usage requests that will be used for certificate issuance. Supported values: clientauth, serverauth, If critical is present the extension will be marked as critical
--extra-extensions: A JSON string that defines the requested extra extensions for the certificate
--extra-extensions-file-path: A path to a file containing a JSON string that defines the requested extra extensions for the certificate
-o, --outfile: Output file path with the certificate. If not provided, the file with the certificate will be created in the same location as the provided public key with the -cert extension
validate-certificate-challenge
validate-certificate-challengeValidates an ACME HTTP-01 challenge and finalizes certificate issuance (Phase 2)
Usage
akeyless validate-certificate-challenge \
--name <Certificate name> \
--cert-display-id <Certificate display ID from get-pki-certificate> \
--timeout[=120] <Validation timeout in seconds>Flags
-n, --name: Certificate name (alternative to --cert-display-id)
-d, --cert-display-id: Certificate display ID from get-pki-certificate (alternative to --name)
--timeout[=120]: Validation timeout in seconds
get-cert-challenge
get-cert-challengeGet a challenge for certificate authentication
Usage
akeyless get-cert-challenge \
--access-id <AccessID> \
--cert-data 'Certificate data encoded in Base64'renew-certificate
renew-certificateRenew a PKI certificate
Usage
akeyless renew-certificate \
--name <Certificate name> \
--item-id <Certificate Item-ID>Flags
-n, --name: Certificate name
-i, --item-id: Certificate item ID
--generate-key: Generate a new key as part of the certificate renewal
-c, --cert-issuer-name: Optional,the name of the PKI certificate issuer, relevant only for imported Certificates.
update-pki-cert-issuer
update-pki-cert-issuerUpdates a PKI certificate issuer
Usage
akeyless update-pki-cert-issuer \
--name <PKI issuer name> \
--ttl <The maximum requested Time To Live for issued certificates, in seconds> \
--new-name <New item name> \
--signer-key-name <A key to sign the certificate with> Flags
-n, --name: Required, PKI certificate issuer name
--new-name: New item name
-s, --signer-key-name: A key to sign the certificate with
-t, --ttl: Required, The maximum requested Time To Live for the issued certificate by default in seconds; supported formats are s, m, h, d. If using Public CA, this is based on the CA target's supported maximum TTLs
--gw-cluster-url: The GW cluster URL to issue the certificate from, required in Public CA mode
--allowed-uri-sans: A list of the allowed URIs that clients can request to be included in the certificate as part of the URI Subject Alternative Names (in a comma-delimited list)
--allow-subdomains: If set, clients can request certificates for subdomains and wildcard subdomains of the allowed domains
--not-enforce-hostnames: If set, any names are allowed for CN and SANs in the certificate and not only a valid host name
--allow-any-name: If set, clients can request certificates for any CN
--not-require-cn: If set, clients can request certificates without a CN
--server-flag: If set, certificates will be flagged for server auth use
--client-flag: If set, certificates will be flagged for client auth use
--code-signing-flag: If set, certificates will be flagged for code signing use
--key-usage[=DigitalSignature, KeyAgreement, KeyEncipherment]: A comma-separated string or list of key usages
--critical-key-usage[=true]: Mark key usage as critical [true/false]
--organization-units: A comma-separated list of organizational units (OU) that will be set in the issued certificate
--organizations: A comma-separated list of organizations (O) that will be set in the issued certificate
--country: A comma-separated list of the country that will be set in the issued certificate
--locality: A comma-separated list of the locality that will be set in the issued certificate
--province: A comma-separated list of the province that will be set in the issued certificate
--street-address: A comma-separated list of the street address that will be set in the issued certificate
--postal-code: A comma-separated list of the postal code that will be set in the issued certificate
--destination-path: A path in Akeyless which to save generated certificates
--protect-certificates: Whether to protect generated certificates from deletion
--is-ca: If set, the basic constraints extension will be added to the certificate
--max-path-len[=-1]: The maximum path length for the generated certificate. -1, means unlimited
--enable-acme: If set, the cert issuer will support the ACME protocol
--expiration-event-in: How many days before the expiration of the certificate would you like to be notified. To specify multiple events, use the argument multiple times: --expiration-event-in 1 --expiration-event-in 5
--allowed-extra-extensions: A JSON string that defines the allowed extra extensions for the PKI cert issuer
--allowed-extra-extensions-file-path: A path to a file containing a JSON string that defines the allowed extra extensions for the PKI cert issuer.
--allow-copy-ext-from-csr: If set, will allow copying the extra extensions from the CSR file (if given)
--create-public-crl: Set this to allow the cert issuer will expose a public CRL endpoint
--create-private-crl: Set this to allow the issuer will expose a CRL endpoint in the Gateway
--auto-renew: Automatically renew certificates before expiration
--scheduled-renew: Number of days before expiration to renew certificates
--disable-wildcards[=false]: If set, generation of wildcard certificates will be disabled
--description: Description of the object
--delete-protection: Protection from accidental deletion of this item, [true/false]
--add-tag: List of the new tags that will be attached to this item. To specify multiple tags use the argument multiple times: --add-tag Tag1 --add-tag Tag2
--rm-tag: List of the existent tags that will be removed from this item. To specify multiple tags use the argument multiple times: --rm-tag Tag1 --rm-tag Tag2
Certificate Storage
create-certificate
create-certificateCreates a new certificate
Usage
akeyless create-certificate \
--name <certificate-name> \
--certificate <path-to-certificate-PEM/CER/CRT/PFX/P12>Flags
-n, --name: Required, Unique Certificate name (mandatory)
-c, --certificate: Required, Path to a file that contain the certificate. Supported formats are: pem,cer,crt,pfx,p12.
--certificate-data: Content of the certificate PEM/CER/CRT/PFX/P12 in a Base64 format. It is mandatory to add this OR the --certificate
--format[=pem]: Certificate Format of the certificate and private key, possible values: cer,crt,pem,pfx,p12
--passphrase: Passphrase to decrypt pkcs12/pks certificate data
-p, --private-key: Path to the file with the certificate's private key. Certificate Format should be the same as provided for the certificate
--key-data: Content of the certificate's private key PEM in a Base64 format. If this is defined --private-key is disabled.
-e, --expiration-event-in: How many days before the expiration of the certificate would you like to be notified. To specify multiple events, use argument multiple times: --expiration-event-in 1 --expiration-event-in 5
-k, --key: The name of a key to use to encrypt the certificate's key' (if empty, the account default protectionKey key will be used)
-m, --metadata: Metadata about the certificate
-t, --tag: List of the tags attached to this certificate. To specify multiple tags use argument multiple times: --tag Tag1 -t Tag2
--delete-protection: Protection from accidental deletion of this item, [true/false]
get-certificate-value
get-certificate-valueGets the certificate's PEM, and the private key's PEM if it exists, in a JSON file
Usage
akeyless get-certificate-value --name <certificate-name>Flags
-n, --name: Required, Certificate name
-d, --display-id: Certificate display ID
--version: Certificate version
-c, --cert-issuer-name: The parent PKI Certificate Issuer's name of the certificate, required when used with display-id and token
--certificate-file-output: File to write the certificates to
--private-key-file-output: File to write the private key to
provision-certificate
provision-certificateProvision a certificate content to a target
Usage
akeyless provision-certificate \
--name <Certificate name> \
--item-id <Certificate Item-ID>Flags
-n, --name: Certificate name
-I, --item-id: Certificate item ID
-d, --display-id: Certificate display ID
revoke-certificate
revoke-certificateRevokes a certificate and adds it to the issuer CRL
Usage
akeyless revoke-certificate \
--name <Certificate name> \
--item-id <item-id> Flags
-n, --name: Certificate name
-i, --item-id: The item ID of the certificate to revoke
-s, --serial-number: The serial number of the certificate to revoke, in base10 or hex format
--version: Certificate version to revoke. Required if item-id or name are used
update-certificate-value
update-certificate-valueUpdates the data in an existing certificate
Usage
akeyless update-certificate-value \
--name <certificate-name> \
--certificate <path-to-certificate-PEM/CER/CRT/PFX/P12>Flags
-n, --name: Required, Certificate name
-c, --certificate: Path to a file that contain the certificate. Supported formats are: pem,cer,crt,pfx,p12
--certificate-data: Content of the certificate PEM in a Base64 format. It is mandatory to add this OR the --certificate
--format[=pem]: Certificate Format of the certificate and private key, possible values: cer,crt,pem,pfx,p12
--passphrase: Passphrase to decrypt pkcs12/pks certificate data
-p, --private-key: Path to the file with the certificate's private key. Certificate Format should be the same as provided for the certificate
--key-data: Content of the certificate's private key PEM in a Base64 format. If this is defined --private-key is disabled.
-e, --expiration-event-in: How many days before the expiration of the certificate would you like to be notified. To specify multiple events, use argument multiple times: --expiration-event-in 1 --expiration-event-in 5
-k, --key: The name of a key to use to encrypt the certificate's key' (if empty, the account default protectionKey key will be used)
-m, --metadata: Metadata about the certificate
-t, --tag: List of the tags attached to this certificate. To specify multiple tags use argument multiple times: --tag Tag1 -t Tag2
--delete-protection: Protection from accidental deletion of this item, [true/false]
Automatic Certificate Management Environment (ACME)
generate-acme-eab
generate-acme-eabGenerates an external account binding for a cert issuer
Usage
akeyless generate-acme-eab \
--cert-issuer-name <PKI issuer name> list-acme-accounts
list-acme-accountsLists ACME external accounts for a cert issuer
Usage
akeyless list-acme-accounts \
--cert-issuer-name <PKI issuer name>deactivate-acme-account
deactivate-acme-accountDeactivate an ACME external account
Usage
akeyless deactivate-acme-account \
--cert-issuer-name <PKI issuer name> \
--acme-account-id <Account ID>Chain of Trust
generate-ca
generate-caCreates a new PKI CA and Intermediate issuers
Usage
akeyless generate-ca \
--pki-chain-name <PKI Issuer name> \
--allowed-domains <Allowed domain list> \
--ttl <Issued Certificates TTL> \
--gateway-url 'https://<Your-Akeyless-GW-URL>:8000'Flags
-n, --pki-chain-name: Required, PKI certificate issuer name.
--allowed-domains: Required, A list of the allowed domains clients can request to be included in the certificate (in a comma-delimited list).
-t, --ttl: Required, The maximum requested Time To Live for issued certificate by default in seconds, supported formats are s, m, h, d.
--extended-key-usage[=serverauth,clientauth]: A separate list of extended key usage for the intermediate (serverauth / clientauth / codesigning).
--key-type[=dfc]: The type of the key to generate (dfc/classic-key).
-a, --alg[=RSA4096]: The algorithm (RSA/Elliptic-curve) to use for generating the new key.
--max-path-len[=1]: The maximum number of intermediate certificates that can appear in a certification path.
-u, --gateway-url[=http://localhost:8000]: Gateway URL (Configuration Management port).
-k, --protection-key-name: The name of a key used to encrypt the secret values (if empty, the account default protection key will be used).
-s, --split-level[=3]: The number of fragments that the item will be split into.
--delete-protection: Protection from accidental deletion of this object, [true/false].
Certificate Discovery
certificate-discovery
certificate-discoveryDiscover Certificates in your organization
Usage
akeyless certificate-discovery \
--hosts <IPs, CIDR ranges, or DNS names> \
--port-ranges[=443] <80,8080-8085> \
--target-location 'Discovery-Folder' \
--gateway-url 'https://<Your-Akeyless-GW-URL>:8000'Flags
-o, --hosts: Required, A comma-separated list of IPs, CIDR ranges, or DNS names to scan.
-p, --port-ranges[=443]: A comma-separated list of port ranges. Example: 80, 8080-8085.
-f, --target-location: Required, The folder the certificates that were found in the scan will be saved at.
-e, --expiration-event-in: How many days before the expiration of the certificate would you like to be notified. To specify multiple events, use argument multiple times: --expiration-event-in 1 --expiration-event-in 5.
-k, --protection-key: The name of the key that protects the certificate value (if empty, the account default key will be used).
-d, --debug: Use this flag to run the command in Debug mode.
Updated 2 days ago
