Red Hat CERTIFICATE SYSTEM 8 Install Manual page 48

Hide thumbs Also See for CERTIFICATE SYSTEM 8:
Table of Contents

Advertisement

Chapter 3. Installation and Configuration
5. Select the CA which will issue, renew, and revoke certificates for certificates processed through
the RA. All of the CAs configured in the security domain are listed in a dropdown menu.
6. Click Next on the Internal Database panel; the SQLite database is created automatically.
NOTE
The RA uses a SQLite database to store its configuration and user data rather than an
LDAP database, as the other subsystems do.
7. Select the token which will store the Certificate System certificates and keys; a list of detected
hardware tokens and databases is given.
IMPORTANT
Any hardware tokens used with the instance must be configured before configuring
the subsystem instance. If the HSM is not properly configured, it may not be listed in
the key stores panel or the instance may not function properly. HSM configuration is
described in
To determine whether a token is detected by the Certificate System, use the TokenInfo tool, as
Section 2.5.4, "Detecting
described in
38
Section 2.5.2, "Using Hardware Security Modules with
Tokens".
Subsystems".

Advertisement

Table of Contents
loading

This manual is also suitable for:

System 8 - install guide 25-03-2010

Table of Contents