
CA Name
Enter the technical name of the CA. Directory names, among other things,
are derived from this name, which is why only the characters listed in the
help can be used. The technical name is also displayed in the overview when
the module is started.
Common Name
Enter the name to use to refer to the CA.
E-Mail Addresses
Several e-mail addresses can be entered that can be seen by the CA user.
This can be helpful for inquiries.
Country
Select the country where the CA is operated.
Organisation, Organisational Unit, Locality, State
Optional values
Proceed with Next.
4
Enter a password in the second dialog. This password is always required when
using the CA—when creating a sub-CA or generating certificates. The text fields
have the following meaning:
Key Length
Key Length contains a meaningful default and does not generally need to be
changed unless an application cannot deal with this key length. The higher
the number the more secure your password is.
Valid Period (days)
The Valid Period in the case of a CA defaults to 3650 days (roughly ten
years). This long period makes sense because the replacement of a deleted
CA involves an enormous administrative effort.
Clicking Advanced Options opens a dialog for setting different attributes from
the X.509 extensions (
Figure 17.4, “YaST CA Module—Extended Settings”
(page 209)). These values have rational default settings and should only be changed
if you are really sure of what you are doing. Proceed with Next.
Managing X.509 Certification
203
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......