HP 1910 User Manual page 464

Hide thumbs Also See for 1910:
Table of Contents

Advertisement

Table 125 Configuration items
Item
Description
Domain Name
Enter the name for the PKI domain.
Enter the identifier of the trusted CA.
An entity requests a certificate from a trusted CA. The trusted CA takes the responsibility
CA Identifier
of certificate registration, distribution, and revocation, and query.
In offline mode, this item is optional. In other modes, this item is required.
Select the local PKI entity.
When submitting a certificate request to a CA, an entity needs to show its identity
Entity Name
information.
Available PKI entities are those that have been configured.
Select the authority for certificate request.
Institution
RA is recommended.
Enter the URL of the RA.
The entity will submit the certificate request to the server at this URL through the SCEP
protocol. The SCEP protocol is intended for communication between an entity and an
authentication authority.
Requesting URL
In offline mode, this item is optional. In other modes, this item is required.
This item does not support domain name resolution.
LDAP IP
Enter the IP address, port number and version of the LDAP server.
Port
In a PKI system, the storage of certificates and CRLs is a crucial problem, which is usually
addressed by deploying an LDAP server.
Version
Request Mode
Select the online certificate request mode, which can be auto or manual.
Password
Set a password for certificate revocation and re-enter it for confirmation.
The two boxes are available only when the certificate request mode is set to Auto.
Confirm Password
Specify the fingerprint used for verifying the CA root certificate.
After receiving the root certificate of the CA, an entity needs to verify the fingerprint of the
root certificate, namely, the hash value of the root certificate content. This hash value is
Fingerprint Hash
unique to every certificate. If the fingerprint of the root certificate does not match the one
configured for the PKI domain, the entity will reject the root certificate.
Fingerprint
The fingerprint must be configured if you specify the certificate request mode as Auto. If you
specify the certificate request mode as Manual, you can leave the fingerprint settings null. If
you do not configure the fingerprint, the entity will not verify the CA root certificate and you
yourself must make sure that the CA server is trusted.
Polling Count
Set the polling interval and attempt limit for querying the certificate request status.
CA—Indicates that the entity requests a certificate from a CA.
RA—Indicates that the entity requests a certificate from an RA.
IMPORTANT:
If you specify MD5 as the hash algorithm, enter an MD5 fingerprint. The fingerprint
must a string of 32 characters in hexadecimal notation.
If you specify SHA1 as the hash algorithm, enter an SHA1 fingerprint. The fingerprint
must a string of 40 characters in hexadecimal notation.
IMPORTANT:
403

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents