
Configuring a Registration Manager
148
Red Hat Certificate System Administrator’s Guide • September 2005
You can also change the IP address for the CS instance. You might do this if you have more
than one IP address set up on your machine and want separate instances of CS to use
different IP addresses. You cannot do this during installation; you must change this setting
after installation. See “Changing an IP Addresses,” on page 280 for details.
Changing Subsystem Security Setting
You can configure the security of each subsystem by changing the SSL version used by the
subsystem and enabling or disabling ciphers, see “Configuring the Server’s Security
Preferences,” on page 309.
Changing Passwords or Storage Settings
Each subsystem stores passwords for its internal database, and for the tokens containing its
keys and certificates. See “System Passwords,” on page 244 for information on how these
passwords are stored.
Configuring Logs
Each subsystem creates a number of logs that detail various events and errors. Each
subsystem also has the ability to create signed audit logs that create audit trails that can only
be read by a user with auditor privileges. The log feature is configurable allowing you to
change the settings for some of the logs. See “Logs,” on page 255 for complete information
about the logs and details of the configuration options for logs.
Changing Internal Database Settings
You can change the configuration of the internal database after installation including
restricting access to the internal database, see “The Internal Database,” on page 281 for
information on doing this, and for information about viewing the internal database.
If the password changes for the user ID CS uses to bind to this database, you need to update
the password in the password cache. See “System Passwords,” on page 244.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...