{"type":"api","title":"Get certificate for alias server","meta":{"id":"/apps/pubhub/media/cisco-catalyst-sd-wan-api-guide-20-18/1c4807bcb76af36988ebb37dc2e455b1787a155e/744a8207-9965-344e-aed3-d3ef846a4950","info":{"title":"Others","description":"Other APIs\n- Include APIs that do not belong to other categories\n","contact":{"email":"vmanage@cisco.com"},"version":"20.18 - 2025-08-15"},"openapi":"3.1.0","servers":[{"url":"/dataservice"}]},"spec":{"tags":["Certificate Management - vManage"],"summary":"Get certificate for alias server","description":"Get certificate for alias server","operationId":"getCertificate","responses":{"200":{"description":"Success","content":{"application/json":{"schema":{"type":"string"},"examples":{"Get Certificate Response":{"description":"Get Certificate Response","value":{"certificateDetails":"[\n[\n Version: V3\n Subject: OU=Cisco SD-WAN, O=Cisco Systems, L=Milpitas, ST=CA, C=US, CN=cisco.com\n Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11\n\n Key: Sun RSA public key, 2048 bits\n params: null\n modulus: 24415088922664979671266902719578448729590096123090308050409894246597037700826457468704530842642857210156719189053986929777579954182298529791833634799228627082206493387686427677536313110839238698248165839347164214877888890446621780244952412251221990595038507887048648188323999541630899482272693863504123774666852341902112064345683135475647894137312832136535446260038835674001216595312699436648811347882223942474007050591244735744391580907566490720180118367224323510481486966646378660911263056906871142696104218558212034525779150587185709393002825262227305564185461530730580791421717034120540280561841311367840663024203\n public exponent: 65537\n Validity: [From: Thu May 23 08:34:33 UTC 2024,\n To: Sun May 23 08:34:33 UTC 2027]\n Issuer: OU=Cisco SD-WAN, O=Cisco Systems, L=Milpitas, ST=CA, C=US, CN=cisco.com\n SerialNumber: [ 70e8ae87 ce97a5cd 24eb8b4a 1d79f4ca 3d6e6c6b]\n\nCertificate Extensions: 3\n[1]: ObjectId: 2.5.29.35 Criticality=false\nAuthorityKeyIdentifier [\nKeyIdentifier [\n0000: 15 4A 9F 50 00 1F A2 E7 E4 53 BB C4 96 B2 63 15 .J.P.....S....c.\n0010: 3C 74 CD ED \u003ct..\n]\n]\n\n[2]: ObjectId: 2.5.29.19 Criticality=true\nBasicConstraints:[\n CA:true\n PathLen:2147483647\n]\n\n[3]: ObjectId: 2.5.29.14 Criticality=false\nSubjectKeyIdentifier [\nKeyIdentifier [\n0000: 15 4A 9F 50 00 1F A2 E7 E4 53 BB C4 96 B2 63 15 .J.P.....S....c.\n0010: 3C 74 CD ED \u003ct..\n]\n]\n\n]\n Algorithm: [SHA256withRSA]\n Signature:\n0000: 85 12 9B E8 53 28 21 0F 30 5C 67 AB 53 B1 B8 45 ....S(!.0\\g.S..E\n0010: E4 60 EB 39 3A 17 71 08 FB 1F 75 67 42 77 1C F9 .`.9:.q...ugBw..\n0020: B7 F6 31 02 E7 9C E2 04 62 2D EC 8A CD F3 13 02 ..1.....b-......\n0030: 42 AE EB 3B 91 68 8F 6D FA 1C 2A AF FB 0C 23 BE B..;.h.m..*...#.\n0040: 56 0F 75 73 72 01 C0 02 8D 44 1B 5F 93 3A 46 5D V.usr....D._.:F]\n0050: 7D BA 8B D9 64 1E 20 29 D1 FE 1F 79 53 B1 C9 4E ....d. )...yS..N\n0060: 74 47 F2 4E E8 C9 C7 66 A9 AB 8D 27 4C C4 BF F8 tG.N...f...'L...\n0070: FE AF B2 0D 02 9B 97 33 4C 02 15 0D 5C 77 05 B4 .......3L...\\w..\n0080: D3 15 0E A6 AE 6D B3 B9 92 B4 C2 23 D1 14 A4 82 .....m.....#....\n0090: 73 38 C2 CA 99 B2 3C E5 3A 81 8F 4D BB 4F CC 50 s8....\u003c.:..M.O.P\n00A0: F4 4D E5 C6 DB 3E 4C FE 67 E5 04 8B BB F9 44 6C .M...\u003eL.g.....Dl\n00B0: A3 BA CC AA 9B 2D D9 04 71 C6 C7 47 1A CF 8C 1A .....-..q..G....\n00C0: AC C8 02 36 6F DD 16 6B 04 67 AE BF 03 05 C5 6C ...6o..k.g.....l\n00D0: 43 DC 4C D0 F3 CD 83 1C 5C B3 17 95 EC FA 2E 80 C.L.....\\.......\n00E0: D2 FA 62 81 A7 67 AF AF 8A 35 B2 E0 8E C9 B3 1E ..b..g...5......\n00F0: 58 12 7F B2 8F 54 83 56 42 A6 6B E1 39 B8 0A 49 X....T.VB.k.9..I\n\n]"},"$$ref":"#/components/examples/ComViptelaVmanageServerSettingapiResponseExampleGetwebservercertificategetcertificateresponse"}}}}},"400":{"description":"Bad Request"},"403":{"description":"Forbidden"},"500":{"description":"Internal Server Error"}},"x-roles-required":"Settings-write","method":"get","path":"/setting/configuration/webserver/certificate/getcertificate"}}