SECURITY AND PROTECTION
the Root Certificate (CA) and Device Certificate for TLS connections, web self-
generated certificate and SCEP.
The following certificate fields are available for display:
•
Serial Number
•
Subject Name
•
Issuer Name
•
Validity Period. This includes notBefore and notAfter dates.
•
Thumbprint. This is the hash of the certificate.
•
Basic Constraints
•
Subject Alternative Name
•
Key Usage Extensions
•
Extended Key Usage
You cannot view the information about the Device Private Key. When
you press
View
Private Key Content Hidden.
Support of the PKCS12 file
You can import the Identity certificate and the Private key for any TLS connection
in a single PKCS12 file format. The encrypted PKCS12 file contains both the
private key and the corresponding certificate.
In the certificate .xml configuration file, provide a valid PKCS12 file, password,
and hash for the required TLS connection. The configured parameters are the
following:
•
<cert_uri format>
•
<cert_hash algo>
•
<cert_pkcs12_password>
The following is the example of the corresponding section in the certificate .xml
configuration file:
<certificates>
...
<sip>
<ca_uri></ca_uri>
<ca_hash algo="md5"></ca_hash>
<cert_uri format="pkcs12/pem"></cert_uri>
<cert_hash algo="md5"></cert_hash>
<privkey_uri></privkey_uri>
, the web interface shows the following message: Device
150