
Managing Authentication Plug-ins
Chapter 10
Authentication
407
Managing Authentication Plug-ins
You can register custom authentication plug-in modules from the CS window. You can
delete an authentication plug-in module that you no longer need by using the CS window.
Before deleting a module, be sure to delete all the instances that are based on this module.
To register or delete a module:
1.
Log in to the CS window (see “Logging Into the CS Console” on page 239).
2.
Select the Configuration tab.
3.
In the navigation tree, click Authentication, and in the right pane, click the
Authentication Plug-in Registration tab.
The tab lists modules that are already registered.
4.
To delete a registered module, select that module and click Delete.
5.
To register a plug-in, click Register.
The Register Authentication Plug-in Implementation window appears.
6.
Specify which module you want to register:
Plugin name.
Type a name for the module.
Class name.
Type the full name of the class for this module—that is, the path to the
implementing Java class. If this class is part of a package, be sure to include the
package name. For example, if you are registering a class named
customAuth
and if
this class is in a package named
com.customplugins
, type
com.customplugins.customAuth
.
7.
Click OK.
Generating Files Required By Third-Party Object
Signing Tools
Note: This feature is supported in the legacy enrollments only. When issuing an
object-signing certificate to Microsoft IE, CS can generate a certificate (
.CER
) and a private
key (
.PVK
) files for use by Microsoft
signcode
tool or any third-party sign tools that rely
on these files. For the server to generate these files, you must edit the default form provided
for requesting an object-signing certificate for browsers.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...