Changing the Trust Settings of a CA Certificate
261
certutil -L -d .
Certificate Authority - Example Domain CT,c,
subsystemCert cert-subsystem u,u,u
Server-Cert cert-example u,u,u
3. Delete the certificate by running the
certutil
with the
-D
option.
certutil -D -d . -n
certificate_nickname
For example:
certutil -D -d . -n "ServerCert cert-example"
4. List the certificates again to confirm that the certificate was removed.
certutil -L -d .
Certificate Authority - Example Domain CT,c,
subsystemCert cert-subsystem u,u,u
For information about using the
certutil
command, see
http://www.mozilla.org/projects/security/pki/
nss/tools/certutil.html
.
11.4.4. Changing the Trust Settings of a CA Certificate
Certificate System subsystems use the CA certificates in their certificate databases to validate
certificates received during an SSL-enabled communication.
It can be necessary to change the trust settings on a CA stored in the certificate database, temporarily
or permanently. For example, if there is a problem with access or compromised certificates, marking
the CA certificate as untrusted prevents entities with certificates signed by that CA from authenticating
to the Certificate System. When the problem is resolved, the CA can be marked as trusted again.
To untrust a CA permanently, consider removing its certificate from the trust database. For
instructions, see
Section 11.4.3, “Deleting Certificates from the Database”
.
11.4.4.1. Changing Trust Settings through the Console
To change the trust setting of a CA certificate, do the following:
1. Open the Certificate System Console.
pkiconsole https://
hostname:SSLport/subsystemType
2. In the
Configuration
tab,
System Keys and Certificates
from the left navigation tree.
3. Select the
CA certificates
tab.
4. Select the CA certificate to modify, and click
Edit
.
Summary of Contents for CERTIFICATE SYSTEM 7.3 - ADMINISTRATION
Page 15: ...xv Index 525 ...
Page 16: ...xvi ...
Page 38: ...Chapter 1 Overview 16 Figure 1 4 Certificate System Architecture ...
Page 82: ...Chapter 2 Installation and Configuration 60 rpm ev rhpki manage ...
Page 154: ...132 ...
Page 194: ...172 ...
Page 238: ...216 ...
Page 244: ...222 ...
Page 246: ...224 ...
Page 286: ...264 ...
Page 292: ...270 ...
Page 318: ...Chapter 13 Certificate Profiles 296 Parameter IssuerType_n IssuerName_n ...
Page 321: ...Freshest CRL Extension Default 299 Parameter PointName_n PointIssuerName_n ...
Page 398: ...376 ...
Page 412: ...390 ...
Page 472: ...450 ...
Page 506: ...484 ...
Page 528: ...506 ...
Page 546: ...524 ...