285 
•  You can obtain the CA certificate through the SCEP protocol. If a CA certificate already exists 
locally, do not obtain the CA certificate again. To obtain a new one, use the pki delete-certificate 
command to remove the CA certificate and local certificates, and then obtain the CA certificate 
again. 
•  You can obtain local certificates or peer certificates through the LDAP protocol. If a PKI domain 
already has local certificates or peer certificates, you can still perform the obtain operation and the 
obtained local certificates or peer certificates overwrite the existing ones. If RSA is used, a PKI 
domain can have two local certificates, one for signing and the other for encryption. Certificates for 
different purposes do not overwrite each other. 
The obtained CA certificate, local certificates, and peer certificates are automatically verified before they 
are saved locally. If the verification fails, they are not saved. 
This command is not saved in the configuration file. 
Examples 
# Obtain the CA certificate from the certificate distribution server. (This operation requires the user to 
confirm the fingerprint of the CA root certificate.) 
<Sysname> system-view 
[Sysname] pki retrieve-certificate domain aaa ca 
The trusted CA's finger print is: 
    MD5  fingerprint:5C41 E657 A0D6 ECB4 6BD6 1823 7473 AABC 
    SHA1 fingerprint:1616 E7A5 D89A 2A99 9419 1C12 D696 8228 87BC C266 
Is the finger print correct?(Y/N):y 
# Obtain the local certificates from the certificate distribution server. 
<Sysname> system-view 
[Sysname] pki retrieve-certificate domain aaa local 
# Obtain the certificate of the peer entity en1 from the certificate distribution server. 
<Sysname> system-view 
[Sysname] pki retrieve-certificate domain aaa peer en1 
Related commands 
•  display pki certificate 
•  pki delete-certificate 
pki retrieve-crl 
Use pki retrieve-crl to obtain CRLs and save them locally. 
Syntax 
pki retrieve-crl domain domain-name 
Views 
System view 
Predefined user roles 
network-admin 
Parameters 
domain-name: Specifies the name of a PKI domain, a case-insensitive string of 1 to 31 characters. The 
domain name cannot contain the following special characters: tilde (~), asterisk (*), backslash (\),