Install Guide

Table Of Contents
X.509v3
supports X.509v3 standards.
Topics:
Introduction to X.509v3 certificates
X.509v3 support in
Information about installing CA certificates
Information about Creating Certificate Signing Requests (CSR)
Information about installing trusted certificates
Transport layer security (TLS)
Online Certificate Status Protocol (OSCP)
Verifying certificates
Event logging
Introduction to X.509v3 certificates
X.509v3 is a standard for public key infrastructure (PKI) to manage digital certificates and public key encryption.
The X.509v3 standard specifies a format for public-key certificates or digital certificates.
Transport Layer Security (TLS) relies on public key certificates to work.
X.509v3 certificates
A X.509v3 or digital certificate is an electronic document used to prove ownership of a public key. It contains information about
the key's identity, information about the key's owner, and the digital signature of an entity that has verified the certificate's
content as correct.
Certificate authority (CA)
The entity that verifies the contents of the digital certificate and signs it indicating that the certificate is valid and correct is
called the Certificate Authority (CA).
Certificate signing requests (CSR)
In an X.509v3 system, an entity that wants a signed certificate or a digital certificate requests one through a Certificate Signing
Request (CSR).
How certificates are requested
The following enumeration describes the generic steps that are involved in issuing a digital certificate:
1. An entity or organization that wants a digital certificate requests one through a CSR.
2. To request a digital certificate through a CSR, a key pair is generated and the CSR is signed using the secret private key.
The CSR contains information identifying the applicant and the applicant's public key. This public key is used to verify the
signature of the CSR and the Distinguished Name (DN).
3. This CSR is sent to a Certificate Authority (CA). The CA verifies the certificate and signs it using the CA's own private key.
4. The CA then issues the certificate by binding a public key to a particular distinguished name (DN). This certificate becomes
the entity's trusted root certificate.
69
1156 X.509v3