Red Hat NETWORK PROXY SERVER 3.7 - Manual do Utilizador Página 59

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 101
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 58
3.4 Creating Your Key and Certificate Request 49
at http://www.thawte.com for more information or contact Thawte at
[email protected] to ask them what documents you’ll need
to provide.
Proof of the right to a domain consists of information proving that you
registeredfor your domain name. You won’t need to provide this proof if
your domain name ends in .com, .edu, .org, .se,or.za.
Proof can be a copy of the domain registration application made to In-
terNIC, the organization that handles all domain registrations within the
US, or a whois query output for your domain name. Thawte will want
to know which authority you registered with (usually it will in InterNIC)
and the names and contact information for the person or persons who
were named in the domain name registration application as administra-
tive contacts and/or technical contacts.
The letter of authorizationis a signed letter from a high-ranking member
of your organization, signifying that the organization’s decision makers
approve of the use of a Thawte digital certificate to authenticate the com-
pany during secure online transactions. This letter is supposed to prevent
non-authorized people from creating an authenticated electronic presence
without first going through the proper channels.
Please visit Thawte’s web site to make sure these requirements haven’t
changed. This list is meant as a generaloverview and is not guaranteedto
be complete.
See Thawte’s website at http://www.thawte.com for more guidance
on what kind of documentation you’ll need to provide.
Once you’ve gathered the materials you’ll need to submit, section 3.7 on
page 59provides the complete steps for requesting acertificate fromthese
certificate authorities. Before you request a certificate, however, you’ll
need to generate a key and a certificate request.
3.4 Creating Your Key and Certificate Request
You’llusetheSSLeayprogram,whichwasinstalledwithyoursecureserver,
to generate an encryption key and a certificate request. You need the key
Vista de página 58
1 2 ... 54 55 56 57 58 59 60 61 62 63 64 ... 100 101

Comentários a estes Manuais

Sem comentários