Operating Systems: i5/OS
             Personalize the table of contents and search results

 

Certificate request settings

 

Use this page to verify the properties of a personal certificate request.

To view this administrative console page, click Security > SSL certificate and key management > Manage endpoint security configurations > Inbound | Outbound > ssl_configuration. Under Related items, click Key stores and certificates > key store. Under Additional Properties, click Personal certificate requests > certificate request .

 

Configuration tab

Key label

Specifies the certificate alias name for the signer in the key store, which is specified in the SSL configuration.

Key size

Size of the keys that are generated.

Requested by

Specifies the Subject distinguished name (DN) that represents the identity of the certificate request.

Fingerprint (SHA Digest)

Specifies the SHA hash of the personal certificate, which can be used to verify that the certificate has not been altered when it is used in a remote connection.

Signature algorithm

Specifies the algorithm used to sign the certificate.




 

Related tasks


Creating a Secure Sockets Layer configuration

 

Related Reference

Key stores and certificates collection Personal certificate requests collection

 

Reference topic