Netscape MANAGEMENT SYSTEM 4.5 Installation And Setup Manual page 340

Hide thumbs Also See for NETSCAPE MANAGEMENT SYSTEM 4.5:
Table of Contents

Advertisement

The CMS Window
Table 9-1 provides details about the tasks you can accomplish from this tab. You
access specific settings by selecting an entry in the navigation tree and working
with the tabs that appear in the right pane.
Table 9-1
Tasks you can accomplish from the Configuration tab
Task
Configuring network
settings
Configuring the internal
database settings
Setting up privileged users
Managing CMS keys and
certificates
Determining
authentication for end
users
340
Netscape Certificate Management System Installation and Setup Guide • October 2001
Description
This involves changing the administration, agent, and end-entity ports of
Certificate Management System. For details, see Chapter 11, "Setting Up
Ports."
This involves specifying the host name and port number of the Directory
Server that Certificate Management System should use for storing data. For
details, see Chapter 12, "Setting Up Internal Database."
This involves operations such as the following:
• Entering information about privileged users (administrators, agents, and
trusted managers) into the CMS internal database.
• Modifying user information.
• Deleting users from the database.
For details, see see Chapter 13, "Managing Privileged Users and Groups."
This involves operations such as the following:
• Managing the CMS certificate database.
• Generating new and renewing existing certificates for the Certificate
Manager, Registration Manager, Data Recovery Manager, and Online
Certificate Status Manager.
• Installing new hardware tokens.
For details, see Chapter 14, "Managing CMS Keys and Certificates."
This involves operations such as the following:
• Viewing currently registered authentication plug-in modules.
• Configuring Certificate Management System to use a specific
authentication method to authenticate end users when they enroll for a
certificate.
• Registering custom authentication plug-in modules.
For details, see Chapter 15, "Setting Up End-User Authentication."

Advertisement

Table of Contents
loading

Table of Contents