
Operation Manual – PKI
H3C S3610&S5510 Series Ethernet Switches
Chapter 1 PKI Configuration
1-14
1.10 Configuring an Access Control Policy
By configuring a certificate attribute-based access control policy, you can further control
access to the server, providing additional security for the server.
Follow these steps to configure a certificate attribute-based access control policy:
To do…
Use the command…
Remarks
Enter system view
system-view
—
Create a certificate
attribute group and enter
its view
pki certificate
attribute-group
group-name
Required
No certificate attribute
group exists by default.
Configure an attribute rule
for the certificate issuer
name, certificate subject
name, or alternative
subject name
attribute
id
{
alt-subject-name
{
fqdn
|
ip
} | {
issuer-name
|
subject-name
} {
dn
|
fqdn
|
ip
} } {
ctn
|
equ
|
nctn
|
nequ
}
attribute-value
Optional
There is no restriction on
the issuer name,
certificate subject name
and alternative subject
name by default.
Return to system view
quit
—
Create a certificate
attribute-based access
control policy and enter its
view
pki certificate
access-control-policy
policy-name
Required
No access control policy
exists by default.
Configure a certificate
attribute-based access
control rule
rule
[
id
] {
deny
|
permit
}
group-name
Required
No access control rule
exists by default.
Caution:
A certificate attribute group must exist to be associated with a rule.
1.11 Displaying and Maintaining PKI
To do…
Use the command…
Remarks
Display the contents or
request status of a
certificate
display pki certificate
{
{
ca
|
local
}
domain
domain-name
|
request-status
}
Available in any view
Display CRLs
display pki crl domain
domain-name
Available in any view