Some test about CRLs and OCSP.

git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@20831 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
Love Hörnquist Åstrand
2007-06-03 06:38:18 +00:00
parent 6e3a180814
commit 0c260a9b11

View File

@@ -379,6 +379,9 @@ Who is allowed to issue certificates.
Who is allowed to requests certificates.
How to handle certificate revocation, issuing CRLs and maintain OCSP
services.
@node Creating a CA certificate, Issuing certificates, Setting up a CA, Top
@section Creating a CA certificate
@@ -460,7 +463,7 @@ request for a certificate. The user can specified what DN the user wants
and what public key. To prove the user have the key, the whole request
is signed by the private key of the user.
Name space management.
@subsection Name space management
What people might want to see.
@@ -470,6 +473,20 @@ Expose privacy information.
Using Sub-component name (+ notation).
@subsection Certificate Revocation, CRL and OCSP
Sonetimes people loose smartcard or computers and certificates have to
be make not valid any more, this is called revoking certificates. There
are two main protocols for doing this Certificate Revocations Lists
(CRL) and Online Certificate Status Protocol (OCSP).
If you know that the certificate is destroyed then there is no need to
revoke the certificate because it can not be used by someone else.
The main reason you as a CA administrator have to deal with CRLs however
will be that some software require there to be CRLs. Example of this is
Windows, so you have to deal with this somehow.
@node Application requirements, CMS signing and encryption, Issuing certificates, Top
@section Application requirements