Turbo,

I believe "rm" is correct if you're using Netscape.  For MS Internet
Explorer,
you'll be warned for each session with your server.

To banish the warning permanently, you'll want to import the certificate of
your certificate authority (not the server's cert) into each browser.  You
can let the browser's certificate import wizard pick the "store" in which to
place it -- the trusted root authorities store.

Of course, you'll want to take safeguards with with your CA's private key,
since after importing it as a trusted authority, your users browsers will
implicitly trust any server cert signed with it, not just your current
server.

I trust (and hope) others on the list will correct me if I've not stated
this accurately.


Donald Griggs
Misys Healthcare Systems
===========================
Views expressed by the author do not necessarily represent those of Misys
Healthcare Systems management nor Board of Directors

==========================================================
> 
> How do I get Windows to recognize me (my CA) as a trusted
> CA?!
> -- 

Click on "accept."

You seem to be missing the point about trusted Certificate Authorities. 
They are "trusted" because they are established third parties in the
business of verifying people and sites are "who they say they are." 
MSIE and other browsers have several trusted CA's on file.  When you
make your own CA - you're obviously not going to be in a program that
was installed prior to your CA's existance.  

But... the browser allows you the option of accepting the certificate as
trusted.  If you do - it will be added to the list of trusted
certificates and you won't see the message again.

rm

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to