Sophie

Sophie

distrib > Mandriva > 2010.2 > i586 > by-pkgid > 0c89b3ea2a5834ec2b3bc40317678ccb > files > 20

xca-0.9.1-1mdv2010.2.i586.rpm

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<HTML>
<HEAD>
 <META NAME="GENERATOR" CONTENT="LinuxDoc-Tools 0.9.21">
 <TITLE>XCA - X Certificate and key management: Certificates</TITLE>
 <LINK HREF="xca-10.html" REL=next>
 <LINK HREF="xca-8.html" REL=previous>
 <LINK HREF="xca.html#toc9" REL=contents>
</HEAD>
<BODY>
<A HREF="xca-10.html">Next</A>
<A HREF="xca-8.html">Previous</A>
<A HREF="xca.html#toc9">Contents</A>
<HR>
<H2><A NAME="s9">9.</A> <A HREF="xca.html#toc9">Certificates</A></H2>


<P>All certificates from the database are displayed in a tree view reflecting
the chain dependencies.
If there is a CA certificate and several client certificates signed by this CA,
the client certificates can be shown by clicking on the plus sign of the CA certificate.</P>

<H2><A NAME="ca_cert"></A> <A NAME="ss9.1">9.1</A> <A HREF="xca.html#toc9.1">CA certificates </A>
</H2>


<P>XCA will recognize CA certificates if the CA flag in the <CODE>Basic Constraints</CODE>
is set to true.
If there is a corresponding private key, the <CODE>CA</CODE>
submenu in the context-menu will be enabled.</P>


<P>For building the chains the CA flag is disregarded, because there are some
CAs without this flag.
Instead it consideres the issuer name and the signature to decide which certificate is the issuer.</P>

<H2><A NAME="ss9.2">9.2</A> <A HREF="xca.html#toc9.2">Generating certificates</A>
</H2>


<P>After clicking on the <CODE>New Certificate</CODE> button the Certificate input dialog will be started to ask
all needed information for generating a new Certificate. See: 
<A HREF="xca-5.html#wizard">The Certificate input dialog</A>
Certificate creation can also be invoked by the context menu of the certificate list background
or by the context menu of the request.
In this case the Certificate input dialog is preset with the request to be signed.</P>


<P>If a <CODE>CA certificate</CODE> is selected in the certificate list, this
certificate will be preselected as signer certificate.</P>

<H2><A NAME="ss9.3">9.3</A> <A HREF="xca.html#toc9.3">Certificate details</A>
</H2>


<P>The signer is the internal name of the issuers certificate, <EM>SELF SIGNED</EM> if it is
self signed or <EM>SIGNER UNKNOWN</EM> if the issuer's certificate is not available.
The validity is set to <EM>valid</EM> if the certificate's dates are valid
or to <EM>Not valid</EM> if they are not, regarding to the internal time and date of the OS.</P>


<P>If the certificate is revoked, the revocation date will be shown instead.</P>


<P>On the <EM>Subject</EM> and <EM>Issuer</EM> tab the distinguished name is
also displayed in a format defined in RFC2253 for copy&amp;paste.</P>

<H2><A NAME="ss9.4">9.4</A> <A HREF="xca.html#toc9.4">Certificate trust</A>
</H2>


<P>The certificate trust can be changed by the context menu of the certificate.
It can be set to:</P>
<P>
<UL>
<LI><B>Not trusted</B> - never trust this certificate, even if
we trust the issuer. This is the default for imported
self-signed certificates.</LI>
<LI><B>Trust depends on issuer</B> - only trust this certificate,
if we trust the issuer. This is the default for imported and
generated non-self-signed certificates.</LI>
<LI><B>Always trust</B> - always trust this certificate, even if
we do not trust the issuer's certificate or if it is absent.
This is the default for generated self-signed certificates.</LI>
</UL>
</P>

<H2><A NAME="ss9.5">9.5</A> <A HREF="xca.html#toc9.5">Certificate export</A>
</H2>


<P>The filename can be selected in the export dialog and the Export format:</P>
<P>
<UL>
<LI><B>PEM</B> - PEM encoded</LI>
<LI><B>PEM with Certificate chain</B> - PEM encoded certificate
and all issuers up to the root certificate in one file</LI>
<LI><B>PEM all trusted Certificates</B> - List of all PEM encoded
certificates that are marked als <EM>Always trusted</EM>
(usually all self-signed certificates) in one file for e.g.
apache as trusted cert store.</LI>
<LI><B>PEM all Certificates</B> - All PEM encoded certificates
in one file.</LI>
<LI><B>DER</B> - DER encoded certificate.</LI>
<LI><B>PKCS#7</B> - DER encoded PKCS#7 structure containing
the certificate.</LI>
<LI><B>PKCS#7 with Certificate chain</B> - DER encoded
PKCS#7 structure containing the
certificate and all issuers up to the root certificate.</LI>
<LI><B>PKCS#7 all trusted Certificates</B> - DER encoded
PKCS#7 structure containing all
certificates that are marked als <EM>Always trusted</EM></LI>
<LI><B>PKCS#7 all Certificates</B> - DER encoded PKCS#7 structure
containing all certificates.</LI>
<LI><B>PKCS#12</B> - PKCS#12 structure containing the certificate
and the corresponding private key</LI>
<LI><B>PKCS#12</B> - PKCS#12 structure containing the certificate,
the corresponding private key and the chain of all
issuers certificates.</LI>
<LI><B>PEM cert + key</B> - concatenation of the private key
and certificate in a format used by apache or the
X509 patch for OpenSSH.</LI>
<LI><B>PEM cert + PKCS8 key</B> - concatenation of the
private key in PKCS#8 format and certificate.</LI>
</UL>
</P>


<P>When exporting PKCS#12 structures you are asked later for an encryption
password.</P>

<H2><A NAME="ss9.6">9.6</A> <A HREF="xca.html#toc9.6">Certificate revocation</A>
</H2>


<P>Certificates can only be revoked, if the private key of the issuer's certificate
is available. The certificate will be marked as revoked and the revocation date
will be stored with the certificate.</P>


<P>To generate a CRL, revoke the appropriate certificates and select CA->GenerateCRL in the context-menu of the signing certificate.</P>

<H2><A NAME="ss9.7">9.7</A> <A HREF="xca.html#toc9.7">Certificate renewal</A>
</H2>


<P>Certificates can only be renewed, if the private key of the issuer's certificate
is available. Renewal is done by creating a new certificate as a copy of the original one
with adjusted validity dates.</P>

<H2><A NAME="ss9.8">9.8</A> <A HREF="xca.html#toc9.8">CA special functions</A>
</H2>


<P>The context menu of CA certificates contains the <EM>CA</EM> submenu,
which makes the following functions available:</P>
<P>
<UL>
<LI><B>Serial</B> The serial number of the next certificate
signed by this issuer.</LI>
<LI><B>CRL days</B> The days until the next CRL release.</LI>
<LI><B>Signing Template</B> The default template for
signing certificates.</LI>
<LI><B>Generate CRL</B> Generate the CRL by collecting all
revoked certificates and their revocation date.</LI>
<LI><B>Use random serial numbers</B> generates an 8 byte unique serial number for every newly issued certificate</LI>
</UL>
</P>

<HR>
<A HREF="xca-10.html">Next</A>
<A HREF="xca-8.html">Previous</A>
<A HREF="xca.html#toc9">Contents</A>
</BODY>
</HTML>