Am 25.11.2013 17:14, schrieb Sassan Panahinejad:
> Hi,
>
> I am dealing with a CA certificate bundle, similar to this one:
> https://github.com/twitter/secureheaders/blob/master/config/curl-ca-bundle.crt,
> like the example, the one I am dealing with was automatically generated
> from mozilla's ce
Broken_Heart (Adeel) wrote:
> Hi all, I had deployed the CA with 365 days, but the certificate
> issue by that were valid for days 500. I want to renew my CA
> certificate, so that the same CA can be used in future instead
> deploying the new one as many of the application have trusted that
> CA,
Well, you can do this via your Certificate Policy document, and assert a
certain OID for each CA. This is rather unusual, as most of the time, a
certificatePolicy OID is for an assurance level, but there's nothing to
stop you from stating in your CP that a CA asserting a given OID is only
able
On Tue, Dec 04, 2007, Eljas Alakulppi wrote:
>
> I would like to seprate my client signing CA and server signing CA. I would
> also like them to force their purpose, so if someone gets a hold of my
> client signing CA, they can't use it to sign server certificates and thus
> cannot claim they a
Darren,
After you created the CSR, you are asking the company(X) you're
working with to sign the CSR so anyone trusting X would also trust your
certificate. Since X signed your CSR, it is acting in the Certificate
Authority(CA) capacity.
In order for your SSL communication to work,
Bencoe, Michael K wrote:
> Our development team just completed a successful experiment using SSL
> and mutual certificate authentication between a Java socket server and a
> C++ socket client. The C++ client used OpenSSL, while the Java server
> used the SSL services provided with the 1.4 SDK. F
In message <[EMAIL PROTECTED]> on Mon, 26 Apr 2004 08:27:12 +0200, testpgp <[EMAIL
PROTECTED]> said:
testpgp> I'm trying to double sign a CA certificate with two others CA
testpgp> (CA1 & CA2) Unfortunately, I can't see such options with
testpgp> openssl. The command I usually use is the followin
On Tue, Jul 22, 2003, 5468696A6D656E wrote:
> (resend because it seems not to have arrived at the list, maybe because it
> is subscribers only?)
>
> Sorry if this has been asked before, but i have a few questions regarding
> creating a ca root certificate: I create the root certificate like this:
Pierre De Boeck wrote:
>
> Hello,
>
> I am trying since two days to insert my own root CA
> into the trusted CA store of IIS. I use, as advised
> by MS, the procedure described in SP4 involving the
> CertMgr wizard but with no success...
>
The simplest way to insert your CA cert from op