Configuring the CAs
- Name
Configuration name of the CA.
- URL
The CA's URL.
- DN
Distinguished name of the device. With this parameter the CAs are assigned
to system certificates (and vice versa) on the one hand. On the other
hand this parameter is also important for evaluating whether received
or available certificates match with the configuration.
- Enc-Alg
This algorithm encrypts the payload of the certificate request.
- Values: DES, 3-DES, Blowfish.
- Default: DES.
- Identifier
CA identifier (as required by some web server to identify the CA).
- RA-Autoapprove
Some CAs provide the option of using an earlier certificate issued by
this CA as proof of authenticity for future requests. This option defines
whether an existing system certificate should be used to sign new requests.
- Values: Yes, No.
- Default: No.
- CA-Signature-Algorithm
The certificate request is signed with this algorithm.
- Values: MD5, SHA1.
- Default: MD5.
- CA-Fingerprint-Algorithm
Algorithm for signing the fingerprint. This determines whether the CA
certificate is to be checked by means of fingerprint, and which algorithm
is used for this. The CA fingerprint has to agree with the checksum which
results when this algorithm is applied.
- Values: Off, MD5, SHA1.
- Default: Off.
- CA-Fingerprint
The authenticity of a received CA certificate can be checked by means
of the the checksum (fingerprint) entered here (corresponding to the
set CA fingerprint algorithm).