REKEY Function—Create Certificate from Existing Certificate

Valid on z/OS.

Use the REKEY command function to create a new certificate from an existing certificate with a new public/private key pair. The REKEY command is the first step of a rekey-rollover process to retire the use of an existing private key.

The REKEY command copies the subject's distinguished name, key usage and subject alternate name from the existing certificate. The new certificate is self-signed and saved under the same logonid or CERTAUTH or CERTSITE.

If the new certificate needs to be signed by a third party CA or CA Top Secret, issue a TSS GENREQ command to copy the new certificate to a dataset then FTP the new certificate to the third party CA or input to the TSS GENCERT so it may be signed with CA Top Secret. Do this prior to the TSS ROLLOVER command.

Specify a DIGICERT name as part of all REKEY functions since the DIGICERT keyword indicates the name used in the digital certificate.

Administrators must have ACID(MAINTAIN) for users within their scope, and MISC4(CERTGEN). Also, MISC4(CERTSITE) for CERTSITE ACID and MISC4(CERTAUTH) for CERTAUTH ACID. This command function has the following format:

TSS REKEY {acid|CERTAUTH|CERTSITE}
          [DIGICERT(existing—certificate—id)]
          [NEWDIGIC(new—certificate—id)]
          [NEWLABLC(new—certificate—label)]
          [KEYSIZE(512|768|1024|2048)]
          [ICSF|PCICC]
          [NBDATE({not—before—date)] NBTIME(not—before—time)
          [NADATE(not—after=date|) NADATE(not—after—date)


Copyright © 2009 CA. All rights reserved. Email CA about this topic