In Administration Console Dashboard, click Security > Trusted Roots.
Click the name of a trusted root.
View the following information:
Field |
Description |
---|---|
Issuer |
The name of the CA that created the certificate. |
Serial number |
The serial number of the certificate. |
Subject |
The subject name of the certificate. |
Valid from |
The first date and time that the certificate is valid. |
Valid to |
The date and time that the certificate expires. |
Devices |
The devices that are configured to hold this certificate on their file system. |
Key size |
The key size that was used to create the certificate. |
Signature algorithm |
The signature algorithm that was used to create the certificate. |
Finger print (MD5) |
The certificate's message digest that was calculated with the MD5 algorithm. It is embedded into the certificate at creation time. It can be used to uniquely identify a certificate. For example, users can verify that a certificate is the one they think it is by matching this published MD5 fingerprint with the MD5 fingerprint on the local certificate. |
Finger print (SHA256) |
The certificate's message digest that was calculated with the SHA-256 algorithm. It is embedded into the certificate at creation time. It can be used to uniquely identify a certificate. For example, users can verify that a certificate is the one they think it is by matching a published SHA-256 fingerprint with the SHA-256 fingerprint on the local certificate. |
The Subject Alternate Names section indicates whether an application should reject the certificate if the application does not understand the alternate name extensions. Any configured alternate names are displayed in the list.
The Key Usage section indicates whether an application should reject the certificate if the application does not understand the key usage extensions. The following are possible:
Sign CRLs: Indicates whether the certificate is used to sign CRLs (Certificate Revocation Lists).
Sign certificates: Indicates that the certificate is used to sign other certificates.
Encrypt other keys: Indicates that the certificate is used to encrypt keys.
Encrypt data directly: Indicates that the certificate encrypts data for private transmission to the key pair owner. Only the intended receiver can read the data.
Create digital signatures: Indicates that the certificate is used to create digital signatures.
Non-repudiation: Indicates that the certificate links a digital signature to the signer and the data. This prevents others from duplicating the signature because no one else has the signer’s private key. Additionally, the signer cannot deny having signed the data.
CRL Distribution Points: Displays a list of Certificate Revocation List (CRL) distribution points that are embedded into the certificate as an extension at certificate creation time. Implementations search the CRL from each distribution point (the distribution point is usually a URI that points to a store of revoked certificates) to see whether a certificate has been revoked.
Authority Info Access (OCSP): Displays a list of Online Certificate Status Protocol (OCSP) responders that are embedded into the certificate as an extension at certificate creation time. Implementations query the OCSP responder to see whether a certificate has been revoked.
Select from the following actions:
Export Public Certificate: Allows you to export a trusted root to a file so that a client can use it to verify the certificate chain sent by a cryptography-enabled application. For more information, see Section 17.5, Exporting a Public Certificate.
Add Trusted Root to Trust Stores: Allows you to assign a trusted root to a device so it can be used by that device. For more information, see Section 19.1.2, Adding Trusted Roots to Trust Stores
Click Close.