get PBS certificate fingerprint from cli


Renowned Member
Jan 26, 2015
My PBS server gets a new certificate every 3 months so I have to manually get the new fingerprint from the server and then import it to the PVE servers. My idea is to automate this process with Ansible. First step is to get the fingerprint from cli. This is my idea:

proxmox-backup-manager cert info | grep Fingerprint | awk '{print $3}'

is there a better option?
Last edited:
is there a reason why the output is different for these 2 command below? letters are all caps when openssl is used.

proxmox-backup-manager cert info | grep Fingerprint | awk '{print $3}'
openssl x509 -in /etc/proxmox-backup/proxy.pem -fingerprint -noout -sha256 | awk '{print $2}' | cut -f2 -d '='
You only need the fingerprint if you dont have a valid certificate, (e.g. it is self-signed) or your PBS is not resolvable via DNS (e.g. you added it via its IP address).

You mentioned a new certificate every 3 months, so I guess you are using a LetsEncrypt certificate for your domain? Then you dont have to use the fingerprint at all. Just input the FQDN of your PBS in the 'Server' field.
  • Like
Reactions: Darkk
Also, you can update the PBS's fingerprint on the datacenter level as it will push it to all the PVE nodes in the cluster. I recently ran into this when I started using Let's Encrypt certs only to find out I don't need to worry about the fingerprint anymore.


The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!