
Managing the Certificate Database
Chapter 8
Administrative Basics
291
Depending on the certificate you want to generate, choose the one in the drop-down list:
•
Certificate Manager Signing Certificate—choose this option if you want to request a
signing certificate for the Certificate Manager. If you choose this option, you must also
specify whether the certificate request is for a self-signed CA (also known as the root
CA) or a subordinate CA.
•
Certificate Manager OCSP Signing Certificate—choose this option if you want to
request an OCSP signing certificate for the Certificate Manager.
•
Data Recovery Manager Transport Certificate—choose this option if you want to
request a transport certificate for the Data Recovery Manager.
•
Online Certificate Status Manager Signing Certificate—choose this option if you want
to request a signing certificate for the Online Certificate Status Manager.
•
Registration Manager Signing Certificate—choose this option if you want to request a
signing certificate for the Registration Manager.
•
SSL Server Certificate—choose this option if you want to generate an SSL server
certificate request for the CS manager.
•
Other—choose this option if you want to generate a certificate request for a certificate
that is not generated by a CS manager by default. For example, in a Certificate
Manager, you can use this option to request a CRL signing certificate or a separate SSL
client certificate exclusively for authenticating to the publishing directory. Be sure to
specify the certificate type in the adjoining field. By default only two certificate types
are supported:
caCrlSigning
for the CRL signing certificate and
client
for SSL
client certificate (see “Getting an SSL Client Certificate for a Subsystem” on page 311)
Step 3. Specify the Key-Pair Information
Specify the key-pair information for the certificate to be requested.
You need to identify the following:
•
The token that contains the key pair for generating the certificate request—the
drop-down list shows the names of tokens currently installed for the selected CS
instance; these are the tokens you can use now.
❍
The internal token is identified as
internal
. You should choose this option if the
key pair for the certificate you chose in the previous step is stored in the local key
database.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...