
Input Reference
Chapter 11
Certificate Profiles
427
Key Generation Input
The
Key Generation Input
input is used for enrollments in which a single key pair will
be generated, generally used for user-based certificate enrollments.
This input puts the following fields into the enrollment form:
Key Generation Request Type.
This field is a read only field displaying
crmf
as the
request type.
Key Generation Request.
This field is a read only field displaying
1024 (High Grade)
as the key generation request.
Subject Name Input
The
Subject Name Input
input is used for enrollment when distinguished name
parameters need to be collected from the user. The collected parameters could be used for
formulating the subject name in the certificate.
This input puts the following fields into the enrollment form:
UID.
This field is for the user ID of this user, as specified for this user in the LDAP
directory.
Email.
This field is for entering the email address of the user.
Common Name.
This field is for entering the name of the user.
Organizational Unit.
This field is for entering the organizational unit to which the user
belongs.
Organization.
This field is for entering the organization name.
Country.
This field is for entering the country to which the user belongs.
Submitter Information Input
The
Submitter Information Input
input is used to collect the certificate requestor's
information such as name, email and phone.
This input puts the following fields into the enrollment form:
Requestor Name.
This field is used to enter the name of the requestor of this certificate.
Requestor Email.
This field is used to enter the email address of the requestor of this
certificate.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...