Specifications
Cisco Systems, Inc.
All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.
Page 31 of 42
1. UsingMicrosoftInternetExplorer,chooseTools >> Internet Options >> Content >> Certificates; a certificate with
the name of the logged-in user ID/username should be present (as shown in Figure 6-16).
Figure 6-16
Microsoft Internet Explorer: Client Certificate Verification
2. Double-click the certificate and verify the following (as stated in Section 5.2.1):
a. Under the “General” section, verify the following (as shown in Figure 6-17): Purpose of the certificate is
“Proves your identity to a remote computer.” The “Issued to” field should contain the user ID or the username
of the XP client, and a message should indicate, “You have a private key that corresponds to this certificate.”
b. Under the “Details” section, verify the following (as shown in Figure 6-18): “Subject” field corresponds to the
username or the user ID used to generate and install the certificate on the XP machine, and the “Enhanced Key
Usage” field (as shown in Figure6-19) should contain “Client Authentication code (1.3.6.1.5.5.7.3.2)”. Refer to
Section 5.2.1 for more details about the Enhanced Key Usage field.
c. Under the “Certification Path” section, verify the following statement: “This certificate is OK.” Verify that the
whole path of certificates until the root (the trusted root certification authority) has been installed (refer to
Figure 6-20).