Provided by: sq_0.37.0-1_amd64 

NAME
sq pki certify - Certify a User ID for a Certificate
SYNOPSIS
sq pki certify [OPTIONS] CERTIFIER-KEY KEY_ID|FINGERPRINT|FILE USERID
DESCRIPTION
Certify a User ID for a Certificate.
Using a certification a keyholder may vouch for the fact that another certificate legitimately belongs to
a user id. In the context of emails this means that the same entity controls the key and the email
address. These kind of certifications form the basis for the Web of Trust.
This command emits the certificate with the new certification. The updated certificate has to be
distributed, preferably by sending it to the certificate holder for attestation. See also `sq key
attest-certifications`.
By default a certification expires after 5 years. Using the `--expiry` argument specific validity
periods may be defined. It allows for providing a point in time for validity to end or a validity
duration.
`sq pki certify` respects the reference time set by the top-level `--time` argument. It sets the
certification's creation time to the reference time.
OPTIONS
Subcommand options
-B, --binary
Emit binary data
-a, --amount=AMOUNT
Set the amount of trust. Values between 1 and 120 are meaningful. 120 means fully trusted.
Values less than 120 indicate the degree of trust. 60 is usually used for partially trusted.
--add-userid
Add the given user ID if it doesn't exist in the certificate.
--allow-not-alive-certifier
Allow the key to make a certification even if the current time is prior to its creation time or
the current time is at or after its expiration time.
--allow-revoked-certifier
Don't fail if the certificate making the certification is revoked.
-d, --depth=TRUST_DEPTH
Set the trust depth (sometimes referred to as the trust level). 0 means a normal certification of
<CERTIFICATE, USERID>. 1 means CERTIFICATE is also a trusted introducer, 2 means CERTIFICATE is a
meta-trusted introducer, etc.
--email
Treat the given user ID as an email address. If more than one user ID contain the given email
address, all are certified.
--expiry=EXPIRY
Define EXPIRY for the certification as ISO 8601 formatted string or custom duration. If an ISO
8601 formatted string is provided, the validity period reaches from the reference time (may be set
using `--time`) to the provided time. Custom durations starting from the reference time may be set
using `N[ymwds]`, for N years, months, weeks, days, or seconds. The special keyword `never` sets
an unlimited expiry.
-l, --local
Make the certification a local certification. Normally, local certifications are not exported.
--non-revocable
Mark the certification as being non-revocable. That is, you cannot later revoke this
certification. This should normally only be used with an expiration.
--notation NAME VALUE
Add a notation to the certification. A user-defined notation's name must be of the form
`name@a.domain.you.control.org`. If the notation's name starts with a !, then the notation is
marked as being critical. If a consumer of a signature doesn't understand a critical notation,
then it will ignore the signature. The notation is marked as being human readable.
-o, --output=FILE
Write to FILE or stdout if omitted
--private-key-store=KEY_STORE
Provide parameters for private key store
-r, --regex=REGEX
Add a regular expression to constrain what a trusted introducer can certify. The regular
expression must match the certified User ID in all intermediate introducers, and the certified
certificate. Multiple regular expressions may be specified. In that case, at least one must
match.
CERTIFIER-KEY
Create the certification using CERTIFIER-KEY.
KEY_ID|FINGERPRINT|FILE
Certify CERTIFICATE.
USERID
Certify USERID for CERTIFICATE.
Global options
See sq(1) for a description of the global options.
EXAMPLES
Juliet certifies that Romeo controls romeo.pgp and romeo@example.org
sq pki certify juliet.pgp romeo.pgp '<romeo@example.org>'
Certify the User ID Ada, and set the certification time to July 21, 2013 at midnight UTC:
sq pki certify --time 20130721 neal.pgp ada.pgp Ada
SEE ALSO
sq(1), sq-pki(1).
For the full documentation see <https://book.sequoia-pgp.org>.
VERSION
0.34.0 (sequoia-openpgp 1.19.0)
Sequoia PGP 0.34.0 SQ(1)