03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 10-30 A personal certificate request<br />

Note: Don’t destroy this certificate request. It must be present in the key store<br />

in order for the certificate to be added once it has been signed by the CA.<br />

Of course, the CA will need to validate the identity claimed by the certificate<br />

before signing it. The certificate request should be copied into the form provided<br />

by the CA, usually on their Web site, and submitted.<br />

Note: Be sure to submit the request in its original form. If the request is being<br />

pasted from a text editor, then ensure that extra characters, such as spaces,<br />

have not been added to the end of the lines. If the request is not submitted<br />

correclty, the reply may not import correctly.<br />

Some CAs offer a convenient service for generating test certificates. These are<br />

certificates that are valid for a short period of time, such as a month, and are<br />

intended for testing purposes only. If the certificate request used in this section is<br />

submitted to Thawte, a well-known CA, the reply is in Base64 encoded format.<br />

274 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!