GET /serverCertificate/details

Use this method to returnd detailed information about the server certificate. The certificate is returned in PEM format.

Authentication

Authentication with user name and password is required.

Request URL

GET https://{management_server_IP}/serverCertificate/details

Query parameters

None

Response codes

Code Description Comments
200 OK The request completed successfully.
400 Bad Request A query parameter or request attribute is missing or not valid, or the operation is not supported. A descriptive error message is returned in the response body.
404 Not found A specified resource cannot be found. A descriptive error message is returned in the response body.
500 Internal Server Error An internal error occurred. A descriptive error message is returned in the response body.

Response body

Attributes Type Description
response Array Information about each certificate
  certificate String Certificate, in PEM format
  issuerDn String LDAP Distinguished Name of the issuer (for example, "CN=demo server,OU=CS,O=Com Ltd.,ST=QLD,C=AU").
  notAfter String Timestamp when the certificate is no longer valid. The timestamp is returned in ISO 8601 format (for example, 2014-02-05T15:54:13Z).
  notBefore String Timestamp when the certificate becomes valid. The timestamp is returned in ISO 8601 format (for example, 2014-02-05T15:54:13Z).
  serialNumber String Serial number of the certificate
  signatureAlgorithm String Algorithm used to sign the certificate (for example, "MD5withRSA","SHA256withRSA").
  status String Certificate status. This can be one of the following values.
  • internal. The server certificate was signed by an internal Certificate Authority.
  • external. The server certificate was signed by an external Certificate Authority.
  subjectDn String LDAP Distinguished Name of the subject (for example, "CN=demo server,OU=CS,O=Com Ltd.,ST=QLD,C=AU").
{message_attributes} varies Status messages (see Status messages).
The following example is returned if the request is successful.
{
   "response": [{
      "certificate": "-----BEGIN CERTIFICATE-----\r\n
                     MIIF2jCCBMKgAwIBAgIVAJgbWgQ/HUsaEEkFEdueK2lEONxqMA0GCSqGSIb3DQEB\r\n
                     CwUAMHkxCzAJBgNVBAYTAlVTMRcwFQYDVQQIEw5Ob3J0aCBDYXJvbGluYTEQMA4G\r\n
                     A1UEBxMHUmFsZWlnaDElMCMGA1UEChMcR2VuZXJhdGVkIGJ5IFNlcnZlciBGaXJt\r\n
                     d2FyZTEJMAcGA1UECxMAMQ0wCwYDVQQDEwRMWENBMCAXDTcwMDEwMTA2MDAwMFoY\r\n
                     DzIwNzAwMTAxMDU1OTU5WjB5MQswCQYDVQQGEwJVUzEXMBUGA1UECBMOTm9ydGgg\r\n
                     Q2Fyb2xpbmExEDAOBgNVBAcTB1JhbGVpZ2gxJTAjBgNVBAoTHEdlbmVyYXRlZCBi\r\n
                     eSBTZXJ2ZXIgRmlybXdhcmUxCTAHBgNVBAsTADENMAsGA1UEAxMETFhDQTCCASIw\r\n
                     DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIRVJvuGU11o9Do/bjQvTbWaSXS9\r\n
                     tFPhg/JyZP5q9RYlCfgRveh1nArAAO7t2XZMLC2l5Cv6kmbQUPsTVQLs2JetmnLS\r\n
                     IpUwOuIwgV4480Il5jF7x4Wx4sDvPSTy9DnbeLUG0PV5zkwNLv8wVGe7eTTWGG2i\r\n
                     SGozfBCuwDc2M06WJPhDiZhBf+CU/d27P3oIDxNUa6NJkfI3CI6sivpTfpT8oHdB\r\n
                     P4PIdKJ4VGmh072bHCOvFa0m4C/eip5h5rskJmw5DHeiujp7nq9o+qOQYLST8mNU\r\n
                     IGuQ+12+s/4JYz2hZAFOtRmPbnmD8YSVPVKP67jYYsQziBn7jNtBS7o0OeUCAwEA\r\n
                     AaOCAlUwggJRMAwGA1UdEwEB/wQCMAAwgbYGA1UdIwSBrjCBq4AUeTimSPAWXgpz\r\n
                     6+pN33JKZ3zks2KhfaR7MHkxCzAJBgNVBAYTAlVTMRcwFQYDVQQIEw5Ob3J0aCBD\r\n
                     YXJvbGluYTEQMA4GA1UEBxMHUmFsZWlnaDElMCMGA1UEChMcR2VuZXJhdGVkIGJ5\r\n
                     IFNlcnZlciBGaXJtd2FyZTEJMAcGA1UECxMAMQ0wCwYDVQQDEwRMWENBghQX60e/\r\n
                     U7Ai3C78CGAhNptbHBF49TAdBgNVHQ4EFgQU/lKzmh6UpXD0dSTFmZk6Z9VRSPYw\r\n
                     ggFnBgNVHREEggFeMIIBWocEfwAAAYIJMTI3LjAuMC4xhxAAAAAAAAAAAAAAAAAA\r\n
                     AAABgg8wOjA6MDowOjA6MDowOjGHEP6AAAAAAAAAAOAAAAAAAACCFmZlODA6MDow\r\n
                     OjA6ZTA6MDowOjAlMTCHEP6AAAAAAAAAKePrsll+T/+CIWZlODA6MDowOjA6Mjll\r\n
                     MzplYmIyOjU5N2U6NGZmZiUxMocECipk3oIaRFJBS05FUlVELThMRjBOLmxlbm92\r\n
                     by5jb22HEP6AAAAAAAAA4VspLzm0URiCGkRSQUtORVJVRC04TEYwTi5sZW5vdm8u\r\n
                     Y29thxD+gAAAAAAAAFXfh605j+bqgiFmZTgwOjA6MDowOjU1ZGY6ODdhZDozOThm\r\n
                     OmU2ZWElMTaHEP6AAAAAAAAAAABe/goqZN6CHWZlODA6MDowOjA6MDo1ZWZlOmEy\r\n
                     YTo2NGRlJTE3gglsb2NhbGhvc3SCBExYQ0EwDQYJKoZIhvcNAQELBQADggEBAJRj\r\n
                     k88tQx4Iit0Q7HpmyjOE9W4ilvVTGZ9Zk56gN2lPWY/m2TL1RLbiid/cWpy6RnNd\r\n
                     PGbO1whRmwTpq5Ihec6wdONLXZFlS5GaOqMu+opzXnwvuGBn1y/jQjnpIV+TcKQL\r\n
                     9LAvzmPoMYd8BqF/sfR1rdmgyGeTzG/yUEaChXG0TLkbkT+9gYFN/gPDy4hAv2i9\r\n
                     zLQnCXsqH5ZIDRAf42P8uHZ6hBkgra/vXdh+rB9mgIJZV2ijgjoYl6bIGw+9zL3L\r\n
                     t2Jfh2u4MCpQs47FVZ2Fds3YaprHf5SVamUspTI0dsNzFU1F/xa2NRaWzu3T5+mj\r\n
                     JOHNoKWv4KcJXzyXuLo=\r\n
                     -----END CERTIFICATE-----\r\n",
        "is   suerDn": "CN=LXCA,OU=,O=Generated by Server Firmware,L=Raleigh,ST=North Carolina,C=US",
        "notAfter": "2070-01-01T05:59:59Z",
        "notBefore": "1970-01-01T06:00:00Z",
        "serialNumber": "981b5a043f1d4b1a10490511db9e2b694438dc6a",
        "signatureAlgorithm": "SHA256withRSA",
        "status": "internal",
        "subjectDn": "CN=LXCA,OU=,O=Generated by Server Firmware,L=Raleigh,ST=North Carolina,C=US"
   }],
   "result": "success",
   "messages": [{
      "id": "FQXHMSE0001I",
      "text": "The request completed successfully."
      "explanation": "",
      "recovery": {
         "text": "Information only; no action is required.",
         "URL": ""
      },
   }]
}