Turbo, I believe "rm" is correct if you're using Netscape. For MS Internet Explorer, you'll be warned for each session with your server.
To banish the warning permanently, you'll want to import the certificate of your certificate authority (not the server's cert) into each browser. You can let the browser's certificate import wizard pick the "store" in which to place it -- the trusted root authorities store. Of course, you'll want to take safeguards with with your CA's private key, since after importing it as a trusted authority, your users browsers will implicitly trust any server cert signed with it, not just your current server. I trust (and hope) others on the list will correct me if I've not stated this accurately. Donald Griggs Misys Healthcare Systems =========================== Views expressed by the author do not necessarily represent those of Misys Healthcare Systems management nor Board of Directors ========================================================== > > How do I get Windows to recognize me (my CA) as a trusted > CA?! > -- Click on "accept." You seem to be missing the point about trusted Certificate Authorities. They are "trusted" because they are established third parties in the business of verifying people and sites are "who they say they are." MSIE and other browsers have several trusted CA's on file. When you make your own CA - you're obviously not going to be in a program that was installed prior to your CA's existance. But... the browser allows you the option of accepting the certificate as trusted. If you do - it will be added to the list of trusted certificates and you won't see the message again. rm ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED] ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]