Red Hat CERTIFICATE SYSTEM 8 Install Manual page 43

Hide thumbs Also See for CERTIFICATE SYSTEM 8:
Table of Contents

Advertisement

The hashing algorithms that are available depend on whether RSA or ECC is selected as the key
type. For RSA, the available algorithms are as follows:
• SHA256withRSA (the default)
• SHA1withRSA
• SHA256withRSA
• SHA512withRSA
• MD5withRSA
• MD2withRSA
For ECC:
• SHA256withEC (the default)
• SHA1withEC
• SHA384withEC
• SHA512withEC
9. Optionally, change the subject names for the certificates.
NOTE
Certificate nicknames must be unique, and changing the default nicknames is one
way to ensure that.
Configuring a CA
33

Advertisement

Table of Contents
loading

This manual is also suitable for:

System 8 - install guide 25-03-2010

Table of Contents