Red Hat CERTIFICATE SYSTEM 7.3 - ADMINISTRATION Administration Manual page 522

Hide thumbs Also See for CERTIFICATE SYSTEM 7.3 - ADMINISTRATION:
Table of Contents

Advertisement

Appendix B. Introduction to Public-Key Cryptography
Figure B.7. Example of a Certificate Chain
A certificate chain traces a path of certificates from a branch in the hierarchy to the root of the
hierarchy. In a certificate chain, the following occur:
• Each certificate is followed by the certificate of its issuer.
• Each certificate contains the name (DN) of that certificate's issuer, which is the same as the subject
name of the next certificate in the chain.
Figure B.7, "Example of a Certificate
In
of the CA, USA CA, that issued that certificate. USA CA's DN is also the subject name of the next
certificate in the chain.
• Each certificate is signed with the private key of its issuer. The signature can be verified with the
public key in the issuer's certificate, which is the next certificate in the chain.
Figure B.7, "Example of a Certificate
In
be used to verify the USA CA's digital signature on the certificate for the Engineering CA.
B.4.6.3. Verifying a Certificate Chain
Certificate chain verification makes sure a given certificate chain is well-formed, valid, properly signed,
and trustworthy. The following procedure is used to form and verify a certificate chain, starting with the
certificate being presented for authentication:
500
Chain", the Engineering CA certificate contains the DN
Chain", the public key in the certificate for the USA CA can

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CERTIFICATE SYSTEM 7.3 - ADMINISTRATION and is the answer not in the manual?

Questions and answers

Table of Contents