User guide
Security System Guide: Table of Contents
xiv
Registering the CA Certificate.............................................................................................7-11
Registering a Site Certificate ..............................................................................................7-11
Registering the Certificate of Another Reliable Site ...........................................................7-12
Registering a CRL ..............................................................................................................7-12
Configuring the Interstage Certificate Environment with PKCS#12..............................................7-13
Configuring the Interstage Certificate Environment.................................................................7-13
Registering PKCS#12 Data, Certificates, and CRLs...............................................................7-14
Registering the CA Certificate.............................................................................................7-14
Importing the PKCS#12 data..............................................................................................7-15
Registering the Certificate of Another Reliable Site ...........................................................7-15
Registering a CRL ..............................................................................................................7-16
Configuring Certificate Settings ....................................................................................................7-17
Defining the Use of Certificates ...............................................................................................7-17
Setting Up Various Service Environments...............................................................................7-17
Certificate Management................................................................................................................7-19
Updating a Certificate (Before Expiration) ...............................................................................7-19
If a New Certificate and CRL are Obtained .............................................................................7-20
Verifying Operation using a Test Site Certificate before System Operation Begins................7-20
Deleting a Certificate................................................................................................................7-20
Making a PKCS#12 Data Backup and Restoring from this Backup ........................................7-20
Chapter 8 Setting and Use of the Certificate/Key Management Environment Using the SMEE
Command
SSL Libraries Used with the Certificate/Key Management Environment........................................8-2
Types of SMEE Libraries ...........................................................................................................8-2
Certificate/Key Management Environment ................................................................................8-3
Environment Setting for Certificate/Key Management Environment .........................................8-5
Creating a Certificate/Key Management Environment .........................................................8-7
Creating a Private Key and Acquiring a Certificate ..............................................................8-9
Registering the Certificate and CRL...................................................................................8-10
Operating the Client Certificate................................................................................................8-11
Obtaining the Client Certificate...........................................................................................8-12
Registering the Client Certificate ........................................................................................8-12
Resource Registration .............................................................................................................8-12
Management of a Certificate/Key Management Environment.................................................8-14
Chapter 9 How to Use SSL with Interstage HTTP Server
Setting SSL for Interstage Certificate Environments.......................................................................9-2
Setting SSL for Certificate/Key Management Environments Configured with the SMEE
Commands......................................................................................................................................9-3