Users Guide
56 Using Server Administrator
X.509 Certificate Management
Web certificates are necessary to ensure the identity of a remote system and
ensure that information exchanged with the remote system cannot be viewed or
changed by others. To ensure system security, it is strongly recommended that:
• You generate a new X.509 certificate, reuse an existing X.509 certificate,
or import a root certificate or certificate chain from a Certification
Authority (CA).
• All systems that have Server Administrator installed have unique host
names.
NOTE: You must be logged in with Administrator privileges to perform certificate
management.
To manage X.509 certificates through the Preferences home page, click
General Settings, click the Web Server tab, and click X.509 Certificate.
You can use this option to:
•
Generate a new X.509 certificate
- Use this option to create a certificate
for access to Server Administrator.
•
Certificate Maintenance
- This option selects an existing certificate that
your company has title to, and uses this certificate to control access to
Server Administrator.
•
Import a root certificate
- This option allows you to import the root
certificate, as well as the certificate response (in PKCS#7 format),
received from the trusted certificate authority.
•
Import certificate chain from a CA
- This option allows you to import the
certificate response (in PKCS#7 format) from the trusted certificate
authority. Some of the reliable certificate authorities are Verisign, Thawte,
and Entrust.
Controlling Server Administrator
Server Administrator automatically starts each time you reboot the managed
system. To manually start, stop, or restart Server Administrator, use the
following instructions.
NOTE: To control Server Administrator, you must be logged in with administrator
privileges (logged in as
root for supported Red Hat
®
Enterprise Linux
®
or SUSE
®
Linux Enterprise Server operating systems).
book.book Page 56 Monday, March 9, 2009 2:15 PM