Red Hat CERTIFICATE SYSTEM 8 - AGENTS GUIDE Informazioni Techniche Pagina 62

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 94
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 61
Figure 5.7. Update Certificate Revocation List
3. Select the algorithm to use to sign the new CRL. Before choosing an algorithm, make sure
that any system or network applications that need to read or view this CRL support the
algorithm.
SHA-1 with RSA generates a 160-bit message digest.
SHA-256 with RSA.
SHA-512 with RSA.
MD5 with RSA generates a 128-bit message digest. Most existing software applications
that handle certificates support only MD5. This is the default algorithm.
MD2 with RSA generates a 128-bit message digest.
Before selecting an algorithm, make sure that the Certificate System has that algorithm
enabled. The Certificate System administrator will have that information.
4. To examine the CRL before updating it, click Display.
The CRL appears in the browser window, allowing the agent to check whether a particular
certificate appears in the list. Use the browser's Back button to return to the Update page.
Chapter 5. CA: Finding and Revoking Certificates
56
Vedere la pagina 61
1 2 ... 57 58 59 60 61 62 63 64 65 66 67 ... 93 94

Commenti su questo manuale

Nessun commento