
Constraints-Specific Policy Module Reference
482
Red Hat Certificate System Administrator’s Guide • September 2005
RSAKeyConstraints
The
RSAKeyConstraints
plug-in module imposes constraints on the following:
•
The minimum and maximum sizes for keys
•
The exponent sizes
The policy restricts the key size to one of the sizes supported by CS—512, 1024, 2048, or
4096. In other words, the policy allows you to set up restrictions on the lengths of public
keys certified by CS.
You may apply this policy to end-entity certificate enrollment and renewal requests. For
example, if you want your CA to certify public keys up to 1024 bits in length for end users,
you can configure the server accordingly using the policy.
During installation, CS automatically creates an instance of the RSA key constraints polic,
named
RSAKeyRule
, that is disabled by default.
Table 12-10 describes the configuration parameters of the
RSAKeyConstraints
policy.
Table 12-9
RevocationConstraints Configuration Parameters
Parameter
Description
enable
Specifies whether the rule is enabled or disabled. Select to enable (default), deselect to
disable.
predicate
Specifies the predicate expression for this rule. If you want this rule to be applied to all
certificate requests, leave the field blank (default). To form a predicate expression, see
“Using Predicates in Policy Rules” on page 465.
allowExpiredCerts
Specifies whether to allow or prevent revocation of expired certificates. Select if you want
the server to revoke expired certificates (default). Deselect if you don’t want the server to
revoke expired certificates.
Table 12-10
RSAKeyConstraints Configuration Parameters
Parameter
Description
enable
Specifies whether the rule is enabled or disabled. Select to enable the rule (default). Deselect
to disable the rule.
predicate
Specifies the predicate expression for this rule. If you want this rule to be applied to all
certificate requests, leave the field blank (default). To form a predicate expression, see “Using
Predicates in Policy Rules” on page 465.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...