
How CA Certificates Establish Trust
465
1. The certificate validity period is checked against the current time provided by the verifier's system
clock.
2. The issuer's certificate is located. The source can be either the verifier's local certificate database
on that client or server or the certificate chain provided by the subject, as with an SSL connection.
3. The certificate signature is verified using the public key in the issuer's certificate.
4. If the issuer's certificate is trusted by the verifier in the verifier's certificate database, verification
stops successfully here. Otherwise, the issuer's certificate is checked to make sure it contains the
appropriate subordinate CA indication in the certificate type extension, and chain verification starts
over with this new certificate.
Figure B.8, “Verifying a Certificate Chain to the Root CA”
presents
an example of this process.
Figure B.8. Verifying a Certificate Chain to the Root CA
Figure B.8, “Verifying a Certificate Chain to the Root CA”
illustrates what happens when only the root
CA is included in the verifier's local database. If a certificate for one of the intermediate CAs, such as
Engineering CA
, is found in the verifier's local database, verification stops with that certificate, as
shown in
Figure B.9, “Verifying a Certificate Chain to an Intermediate CA”
.
Содержание CERTIFICATE SYSTEM 7.2 - MIGRATION GUIDE
Страница 36: ...Chapter 1 Overview 16 Figure 1 4 Certificate System Architecture ...
Страница 144: ...124 ...
Страница 160: ...140 ...
Страница 208: ...188 ...
Страница 210: ...190 ...
Страница 256: ...236 ...
Страница 282: ...Chapter 12 Certificate Profiles 262 Parameter IssuerName_n IssuerType_n ...
Страница 285: ...Freshest CRL Extension Default 265 Parameter PointName_n PointIssuerName_n ...
Страница 335: ...Configuring Mappers 315 Figure 14 9 Selecting a New Mapper Type 6 Edit the mapper instance and click OK ...
Страница 362: ...342 ...
Страница 376: ...356 ...
Страница 436: ...416 ...
Страница 490: ...470 ...
Страница 504: ...484 ...