# Each non-default section refer to separate certificate issuance
# requests. Settings in the default section apply to each sections.

# Message digest to sign the Certificate Signing Request with,
# overriding the req(1ssl) default.
#
#hash =

# Comma-separated list of Key Usages, for instance "digitalSignature,
# keyEncipherment", to include in the Certificate Signing Request.
# See x509v3_config(5ssl) for a list of possible values.  Note that the
# ACME might override the value provided here.
#
#keyUsage =

# Path to the bundle of trusted issuer certificates.  This is used for
# validating each certificate after issuance or renewal.  Specifying an
# empty value skips certificate validation.
#
#CAfile = @@datadir@@/lacme/ca-certificates.crt

# For an existing certificate, the minimum number of days before its
# expiration date the section is considered for re-issuance.
#
#min-days = 21


#[www]

# Path the service's private key.  This setting is required.
#
#certificate-key = /etc/nginx/ssl/srv.key

# Where to store the issued certificate (in PEM format).
#
#certificate = /etc/nginx/ssl/srv.crt

# Where to store the issued certificate along with its chain of trust
# (in PEM format).
#
#certificate-chain = /etc/nginx/ssl/srv.chain.crt

# Subject field of the Certificate Signing Request.  This setting is
# required.
#
#subject = /CN=example.org

# Comma-separated list of Subject Alternative Names.
#
#subjectAltName = DNS:example.org,DNS:www.example.org

# username[:groupname] to chown the issued certificate and
# certificate-chain with.
#
#chown = root:root

# Octal mode to chmod the issued certificate and certificate-chain with.
#
#chmod = 0644

# Command to pass the the system's command shell ("/bin/sh -c") after
# successful installation of the certificate and/or certificate-chain.
#
#notify = /bin/systemctl reload nginx


#[smtp]
#certificate-key = /etc/postfix/ssl/srv.key
#certificate-chain = /etc/postfix/ssl/srv.crt
#subject = /CN=smtp.example.org
#notify = /bin/systemctl reload postfix

; vim:ft=dosini