
284 Chapter 14 Certificates
NN47923-500
Signature
Algorithm
This field displays the type of algorithm that was used to sign the
certificate. Some certification authorities use rsa-pkcs1-sha1 (RSA
public-private key encryption algorithm and the SHA1 hash
algorithm). Other certification authorities can use rsa-pkcs1-md5
(RSA public-private key encryption algorithm and the MD5 hash
algorithm).
Valid From This field displays the date that the certificate becomes applicable.
The text displays in red and includes a Not Yet Valid! message if the
certificate has not yet become applicable.
Valid To This field displays the date that the certificate expires. The text
displays in red and includes an Expiring! or Expired! message if the
certificate is about to expire or has already expired.
Key Algorithm This field displays the type of algorithm that was used to generate the
certificate key pair (the Business Secure Router uses RSA
encryption) and the length of the key set in bits (1 024-bits, for
example).
Subject
Alternative Name
This (optional) field displays the IP address (IP), domain name (DNS),
or e-mail address (EMAIL) of the owner of the certificate.
Key Usage This field displays for what functions the certificate key can be used.
For example, “DigitalSignature” means that the key can be used to
sign certificates and “KeyEncipherment” means that the key can be
used to encrypt text.
Basic Constraint This field displays general information about the certificate. For
example, Subject Type=CA means that this is a certification authority
certificate and “Path Length Constraint=1” means that there can only
be one certification authority in the certification path.
CRL Distribution
Points
This field displays how many directory servers with Lists of revoked
certificates the issuing certification authority of this certificate makes
available. This field also displays the domain names or IP addresses
of the servers.
MD5 Fingerprint This is the message digest of the certificate that the Business Secure
Router calculated using the MD5 algorithm. You can use this value to
verify with the certification authority (over the phone, for example) that
this is actually a valid certificate.
SHA1 Fingerprint This is the message digest of the certificate that the Business Secure
Router calculated using the SHA1 algorithm. You can use this value
to verify with the certification authority (over the phone, for example)
that this is actually a valid certificate.
Table 70 Trusted CA details
Label Description
Komentarze do niniejszej Instrukcji