Specifications
hg-07.fm
A31003-H3580-M103-2-76A9, 01-2009
HiPath 3000/5000 V8 - HG 1500 V8, Administrator Documentation
7-91
Nur für den internen Gebrauch
Explorers
Security
● Type of Signature Algorithm: Select the signature algorithm to be used for this certificate
(you can choose between md5RSA and sha1RSA).
● Public key length: Select the length of the public key used for this certificate (you can
choose between 768, 1024, 1536 and 2048).
● Start Time of Validity Period (GMT): Enter the start time for certificate validity in these
fields. The time specified is interpreted as Greenwich Mean Time (GMT).
● End Time of Validity Period (GMT): Enter the end time for certificate validity in these fields.
The time specified is interpreted as Greenwich Mean Time (GMT).
● Subject Name: Specify the subject name data according to the conventions of the x.509
standard (for example in the "Country (C)" field:" DE for Germany).
● Subject Alternative Name: This optional information distinguishes between the "Distin-
guished Name Format" (such as, the data under "Subject Name") and "Other Format" (for
example, the IP address entry). The input mask is dependent on the selected format.
● CRL Distribution Point: In this field, you can enter a URL to specify the location from which
certificate revocation lists (CRL) are to be distributed.
When all settings are complete, click Generate Certificate followed by OK in the confirmation
mask (save the new configuration status permanently with the Save icon in the control area).
7.2.6.6 View Certificate
You can view a CA certificate. This is only possible if you have already generated at least one
CA certificate (see Section 7.2.6.4, "Generating CA certificates").
WBM path:
WBM > Explorers > Security > (double-click) SSL > (double-click) Certificate Generation >
(right-click) selected CA certificate > Display Certificate
The Certificate Information mask is displayed. This displays general certificate data (such as
the name, type and serial number), information on the issuer and the subject name as well as
encryption data. The public key used and the fingerprint are displayed in hexadecimal format.
For a detailed description of the fields, see Section 7.2.6.4, "Generating CA certificates".
>
A serial number that is used once may not be used for another certificate as the
serial number must be unique for every certificate that is created.