Datasheet
“main” (Installation and Administration) — 2004/6/25 — 13:29 — page 629 — #655
i
i
i
i
i
i
i
i
26
Security in the Network
Figure 26.4: YaST CA Module -– Extended Settings
The tree structure and all extensions known to the system are displayed on
the left. If you click a field here, change the associated value on the right
side and set or delete the “critical” marking with ‘critical’. After clicking
‘Next’, see a short summary and save your changes with ‘Save’.
Note
All changes to the defaults only affect objects created after this
point. Already existing CAs and certificates remain unchanged.
Note
Creating CRLs
If compromised or otherwise unwanted certificates should be excluded
from further use, they must first be revoked. The procedure for this was
explained in Section 26.1.2 on page 626 (for sub-CAs) and Section 26.1.2 on
page 627 (for user certificates). After this, a CRL must be created and pub-
lished with this information.
629SUSE LINUX Enterprise Server










