13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 10-30 A personal certificate requestNote: Don’t destroy this certificate request. It must be present in the key storein order for the certificate to be added once it has been signed by the CA.Of course, the CA will need to validate the identity claimed by the certificatebefore signing it. The certificate request should be copied into the form providedby the CA, usually on their Web site, and submitted.Note: Be sure to submit the request in its original form. If the request is beingpasted from a text editor, then ensure that extra characters, such as spaces,have not been added to the end of the lines. If the request is not submittedcorreclty, the reply may not import correctly.Some CAs offer a convenient service for generating test certificates. These arecertificates that are valid for a short period of time, such as a month, and areintended for testing purposes only. If the certificate request used in this section issubmitted to Thawte, a well-known CA, the reply is in Base64 encoded format.274 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!