Chapter 39 Certificates
UAG5100 User’s Guide
383
Certificate
Information
These read-only fields display detailed information about the certificate.
Type
This field displays general information about the certificate. CA-signed means that a
Certification Authority signed the certificate. Self-signed means that the certificate’s
owner signed the certificate (not a certification authority). “X.509” means that this
certificate was created and signed according to the ITU-T X.509 recommendation that
defines the formats for public-key certificates.
Version
This field displays the X.509 version number.
Serial Number
This field displays the certificate’s identification number given by the certification
authority or generated by the UAG.
Subject
This field displays information that identifies the owner of the certificate, such as
Common Name (CN), Organizational Unit (OU), Organization (O), State (ST), and
Country (C).
Issuer
This field displays identifying information about the certificate’s issuing certification
authority, such as Common Name, Organizational Unit, Organization and Country.
With self-signed certificates, this is the same as the Subject Name field.
“none” displays for a certification request.
Signature Algorithm This field displays the type of algorithm that was used to sign the certificate. The UAG
uses rsa-pkcs1-sha1 (RSA public-private key encryption algorithm and the SHA1 hash
algorithm). Some certification authorities may use rsa-pkcs1-md5 (RSA public-private
key encryption algorithm and the MD5 hash algorithm).
Valid From
This field displays the date that the certificate becomes applicable. “none” displays for a
certification request.
Valid To
This field displays the date that the certificate expires. The text displays in red and
includes an Expired! message if the certificate has expired. “none” displays for a
certification request.
Key Algorithm
This field displays the type of algorithm that was used to generate the certificate’s key
pair (the UAG uses RSA encryption) and the length of the key set in bits (1024 bits for
example).
Subject Alternative
Name
This field displays the certificate owner‘s IP address (IP), domain name (DNS) or e-mail
address (EMAIL).
Key Usage
This field displays for what functions the certificate’s key can be used. For example,
“DigitalSignature” means that the key can be used to sign certificates and
“KeyEncipherment” means that the key can be used to encrypt text.
Basic Constraint
This field displays general information about the certificate. For example, Subject
Type=CA means that this is a certification authority’s certificate and “Path Length
Constraint=1” means that there can only be one certification authority in the
certificate’s path. This field does not display for a certification request.
MD5 Fingerprint
This is the certificate’s message digest that the UAG calculated using the MD5
algorithm.
SHA1 Fingerprint
This is the certificate’s message digest that the UAG calculated using the SHA1
algorithm.
Certificate in PEM
(Base-64) Encoded
Format
This read-only text box displays the certificate or certification request in Privacy
Enhanced Mail (PEM) format. PEM uses lowercase letters, uppercase letters and
numerals to convert a binary certificate into a printable form.
You can copy and paste a certification request into a certification authority’s web page,
an e-mail that you send to the certification authority or a text editor and save the file on
a management computer for later manual enrollment.
You can copy and paste a certificate into an e-mail to send to friends or colleagues or
you can copy and paste a certificate into a text editor and save the file on a
management computer for later distribution (via floppy disk for example).
Table 177
Configuration > Object > Certificate > My Certificates > Edit (continued)
LABEL
DESCRIPTION
Содержание UAG5100
Страница 42: ...Chapter 3 Printer Deployment UAG5100 User s Guide 42 ...
Страница 124: ...Chapter 10 Interfaces UAG5100 User s Guide 124 Figure 82 Configuration Network Interface Ethernet Edit External Type ...
Страница 125: ...Chapter 10 Interfaces UAG5100 User s Guide 125 Figure 83 Configuration Network Interface Ethernet Edit Internal Type ...
Страница 135: ...Chapter 10 Interfaces UAG5100 User s Guide 135 Figure 88 Configuration Network Interface PPP Add ...
Страница 213: ...Chapter 20 UPnP UAG5100 User s Guide 213 Figure 139 Network Connections My Network Places Properties Example ...
Страница 227: ...Chapter 24 Web Authentication UAG5100 User s Guide 227 Figure 152 Configuration Web Authentication Web Portal ...
Страница 228: ...Chapter 24 Web Authentication UAG5100 User s Guide 228 Figure 153 Configuration Web Authentication User Agreement ...
Страница 273: ...Chapter 26 Billing UAG5100 User s Guide 273 Figure 190 Configuration Billing Payment Service Custom Service ...
Страница 292: ...Chapter 30 IPSec VPN UAG5100 User s Guide 292 Figure 201 Configuration VPN IPSec VPN VPN Connection Add Edit ...
Страница 298: ...Chapter 30 IPSec VPN UAG5100 User s Guide 298 Figure 203 Configuration VPN IPSec VPN VPN Gateway Add Edit ...
Страница 314: ...Chapter 30 IPSec VPN UAG5100 User s Guide 314 ...
Страница 387: ...Chapter 39 Certificates UAG5100 User s Guide 387 Figure 256 Configuration Object Certificate Trusted Certificates Edit ...
Страница 436: ...Chapter 42 Log and Report UAG5100 User s Guide 436 Figure 302 Configuration Log Report Email Daily Report ...
Страница 440: ...Chapter 42 Log and Report UAG5100 User s Guide 440 Figure 304 Configuration Log Report Log Settings Edit System Log ...
Страница 445: ...Chapter 42 Log and Report UAG5100 User s Guide 445 Figure 306 Configuration Log Report Log Settings Edit Remote Server ...
Страница 491: ...Appendix A Legal Information UAG5100 User s Guide 491 Environmental Product Declaration ...