Red Hat CERTIFICATE SYSTEM 8 Install Manual page 59

Hide thumbs Also See for CERTIFICATE SYSTEM 8:
Table of Contents

Advertisement

Having unique certificate nicknames is vital for using an HSM, since any nickname
conflicts (even for subsystems on different servers) will cause configuration to fail.
10. The next panels generate and show certificate requests, certificates, and key pairs.
If an external CA is used to issue the certificates, configuration cannot go forward until they
are received from the CA. When they are issued, paste the certificates into this panel to add
them to the subsystem database, and then proceed with the installation. Click Apply to view the
certificates as they are imported.
11. Provide the information for the new subsystem administrator.
Configuring a DRM, OCSP, or TKS
49

Advertisement

Table of Contents
loading

This manual is also suitable for:

System 8 - install guide 25-03-2010

Table of Contents