Certificates

Some of you may have struck the Certificates does not conform to algorithm constraints issue with Sentinel and been a bit confused by the original response of “A proper resolution is to use custom certificates on the logging applications that use strong encryption (key sizes of 1024 or more). Once all applications have been updated,…

+ read more

ScorpionSting
Aug 22, 2014
11:34 am
Reads:
870
Score:
5

When you define a reverse proxy with SSL support (Enable SSL between Browser and Access Gateway), you cannot specify a SSL certificate for each published dns name. So you have to define a unique certificate with a lot of Subject Alternative Names. If you want to handle your proxy services separately, each one with his…

+ read more

By: nsanson
May 30, 2014
11:23 am
Reads:
1,042
Score:
5

If you’ve been in IT for most than ten minutes, and if you are working with any sort of encryption, and if you are security-conscious at all, it is likely that you have dealt with certificates and needed to get a service’s certificate chain sooner than later.  This is usually accomplished by going into some…

+ read more

By: ab
Aug 13, 2013
11:27 am
Reads:
1,765
Score:
5

I wanted to bring up an item related to NetIQ Operations Center. For security and compliance purposes, we digitally sign the Operations Center Java Web Start client jar files with a code signing certificate. This is useful for large enterprise customers with specific security rules and regulations. The purpose of this is to inform users…

+ read more

Tobin Isenberg
Mar 21, 2013
8:44 am
Reads:
1,113
Score:
Unrated

Tired of bumping into complex keytool commands for importing trusted root certificates in your keystore? Here is a pair of tools that can expedite the process for you.

mbluteau
By: mbluteau
Feb 24, 2012
2:50 pm
Reads:
2,987
Score:
5

This solution / tool will allow users to do an LDAP authentication with out having an LDAP server certificate.

Sep 1, 2009
2:56 pm
Reads:
1,572
Score:
Unrated

Never get caught with expired eDirectory certificates again. Use the checkcerts.pl perl script as a cron job to provide regular alerts for expired or soon to expire certificates.

By: rridley
May 29, 2009
12:02 pm
Reads:
1,634
Score:
Unrated

Increase the security of your entire IT infrastructure by using certificate based authentication of users and devices. Our integration module can automatically create certificates for all objects in your directory (user and devices) using the PKI Certificate Authority offered by PrimeKey’s EJBCA and export the certificates as PFX, CER or DER files.

afuhrmann
By: afuhrmann
Jan 29, 2008
7:07 am
Reads:
1,632
Score:
Unrated

Here are some pointers from David Gersic and Yancey Yeargan on avoiding certificate hassles with IDM drivers.

By: kmillecam
May 23, 2007
7:13 am
Reads:
1,431
Score:
Unrated

Jamie Roth shares a tip for resolving an error when certificates are viewed on NRM with NDPS.

By: coolguys
May 2, 2007
5:33 am
Reads:
939
Score:
Unrated