Extended Key Usage Extension Constraint; Extension Constraint; Key Constraint; Key Usage Extension Constraint - Red Hat CERTIFICATE SYSTEM 7.2 - ADMINISTRATION Administration Manual

Hide thumbs Also See for CERTIFICATE SYSTEM 7.2 - ADMINISTRATION:
Table of Contents

Advertisement

Parameter
Table 12.21. Basic Constraints Extension Constraint Configuration Parameters

12.8.2. Extended Key Usage Extension Constraint

The Extended Key Usage extension constraint checks if the Extended Key Usage extension on the
certificate satisfies the criteria set in this constraint.
Parameter
Critical
exKeyUsageOIDs
Table 12.22. Extended Key Usage Extension Constraint Configuration Parameters

12.8.3. Extension Constraint

This constraint implements the general extension constraint. It checks if the extension is present.

12.8.4. Key Constraint

This constraint checks the key length.
Parameter
keyType
keyMinLength
keyMaxLength
Table 12.23. Key Constraint Configuration Parameters

12.8.5. Key Usage Extension Constraint

The Key Usage extension constraint checks if the key usage constraint in the certificate request
satisfies the criteria set in this constraint.
Parameter
critical
digitalSignature
nonRepudiation
Extended Key Usage Extension Constraint
283

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CERTIFICATE SYSTEM 7.2 - ADMINISTRATION and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Table of Contents