
Managing the Certificate Database
288
Red Hat Certificate System Administrator’s Guide • September 2005
Installing a New CA Certificate in the Certificate
Database
You may need to install new trusted CA certificates in the certificate database of a CS
instance. For example, assume that you renewed the signing certificate of a Registration
Manager. Also assume that the CA that signed the Registration Manager’s certificate is not
included in the trust database of the Certificate Manager that has been configured to sign
certificate requests from this Registration Manager.
When the Registration Manager attempts to request a service from the Certificate Manager
(using the renewed certificate for SSL client authentication), the Certificate Manager fails
to authenticate the Registration Manager. This happens because, as a part of validating the
certificate presented by the Registration Manager, the Certificate Manager checks its
certificate database for the CA that signed the Registration Manager’s certificate. The
Certificate Manager does not find the CA listed in its trust database as a trusted CA, so it
rejects the Registration Manager’s service request.
The Certificate Setup Wizard built into the CS window automates the process of installing
trusted CA certificates in the certificate database. For instructions on using the wizard, see
“Using the Wizard to Install a Certificate or Certificate Chain” on page 299.
Installing a CA Certificate Chain in the Certificate
Database
Any client or server software that supports certificates maintains a collection of trusted CA
certificates in its certificate database. These CA certificates determine which other
certificates the software can validate—in other words, which issuers of certificates the
software can trust. In the simplest case, the software can validate only certificates issued by
one of the CAs for which it has a certificate. It’s also possible for a trusted CA certificate to
be part of a chain of CA certificates, each issued by the CA above it in a certificate
hierarchy; for details on certificate hierarchies and certificate chains, see “How CA
Certificates Are Used to Establish Trust” in Appendix D of
Managing Servers with Red
Hat Console
.
NOTE
Be sure to choose the “Other Trusted CAs” option in Step 2 of the wizard
process.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...