Listing Keys and Certificates
■
To list the keys and certificates in the configured PKCS#11 tokens, run the following
command:
certutil -L -d
AS_NSS_DB
[-h
tokenname
]
For example, to list the contents of the default NSS soft token, type:
certutil -L -d
AS_NSS_DB
The standard output will be similar to the following:
verisignc1g1
T,c,c
verisignc1g2
T,c,c
verisignc1g3
T,c,c
verisignc2g3
T,c,c
verisignsecureserver
T,c,c
verisignc2g1
T,c,c
verisignc2g2
T,c,c
verisignc3g1
T,c,c
verisignc3g2
T,c,c
verisignc3g3
T,c,c
s1as
u,u,u
The output displays the name of the token in the left column and a set of three trust
attributes in the right column. For Enterprise Server certificates, it is usually
T,c,c
. Unlike
the J2SE
java.security.KeyStore
API, which contains only one level of trust, the NSS
technology contains several levels of trust. Enterprise Server is primarily interested in the
first trust attribute, which describes how this token uses SSL. For this attribute:
T
indicates that the Certificate Authority (CA) is trusted for issuing client certificates.
u
indicates that you can use the certificates (and keys) for authentication or signing.
The attribute combination of
u,u,u
indicates that a private key exists in the database.
■
To list the contents of the hardware token,
mytoken
, run the following command:
certutil -L -d
AS_NSS_DB
-h mytoken
You will be prompted for the password for the hardware token. The standard output is
similar to the following:
Enter Password or Pin for
"
mytoken
"
:
mytoken:Server-Cert
	u,u,u
Using Hardware Crypto Accelerator With Enterprise Server
Chapter 9 • Configuring Security
123
Содержание Sun GlassFish Enterprise Server 2.1
Страница 12: ...12 ...
Страница 13: ...Figures FIGURE 1 1 Enterprise Server Instance 29 FIGURE 9 1 RoleMapping 105 13 ...
Страница 14: ...14 ...
Страница 18: ...18 ...
Страница 38: ...38 ...
Страница 62: ...62 ...
Страница 96: ...96 ...
Страница 126: ...126 ...
Страница 160: ...160 ...
Страница 214: ...214 ...
Страница 218: ...218 ...
Страница 230: ...230 ...