
Importing Certificates into Communicator
Appendix F
Certificate Download Specification
723
•
Subsequent certificates are all treated the same. If the certificates contain the SSL-CA
bit in the redhat-cert-type certificate extension and do not already exist in the local
certificate database, they are added as untrusted CAs. In this way they can be used for
certificate chain validation as long as there is a trusted CA somewhere along the chain.
Importing Certificates into Communicator
Communicator imports certificates via HTTP. There are several MIME content types that
are used to indicate to Communicator what type of certificate is being imported. These
MIME types are as follows:
•
application/x-x509-user-cert
The certificate being downloaded is a user certificate belonging to the user operating
Communicator. If the private key associated with the certificate does not exist in the
user’s local key database, then Communicator generates an error dialog and the
certificate is not imported. If a certificate chain is being imported, then the first
certificate in the chain must be the user certificate, and any subsequent certificates will
be added as untrusted CA certificates to the local database.
•
application/x-x509-ca-cert
The certificate being downloaded represents a certificate authority. When it is
downloaded, a sequence of dialogs guides the user through the process of accepting the
Certificate Authority and deciding whether to trust sites certified by the CA.
If a certificate chain is being imported, the first certificate in the chain must be the CA
certificate, and Communicator adds any subsequent certificates in the chain to the local
database as untrusted CA certificates.
•
application/x-x509-email-cert
The certificate being downloaded is a user certificate belonging to another user for use
with S/MIME. If a certificate chain is being imported, the first certificate in the chain
must be the user certificate, and Communicator adds any subsequent certificates to the
local database as untrusted CA certificates. This process allows people or CAs to post
their email certificates on web pages for download by other users who want to send
them encrypted mail.
NOTE
Communicator checks that the size of the object being downloaded
matches the size of the encoded certificates. Therefore it is important to
ensure that no extra characters, such as
NULL
or
Newline
, are added at the
end of the object.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...