Deleting root certificates invalidates the trusted root certification authorities.
删除根证书将使受信任根证书颁发机构失效。
Stores root certificates along with single service certificate and associated private key.
存储根证书和单个服务证书以及相关私有密钥。
Since we are using only self-signed certificates, all of these root certificates represent inappropriate access grants to our queue managers.
因为我们现在只使用自签名证书,所有这些根证书代表对我们的队列管理器的不恰当的访问授权。
These certificates, along with root certificates to validate the other party's certificate, are stored in a key database that is installed with Connection Manager.
这些凭证,以及用于验证其他方凭证的root凭证,存储在一个密钥数据库中,这个密钥数据库是随Connection Manager一起安装的。
Workaround: Ensure that you are using valid, non-expired security certificates issued by a trusted root certification authority.
处理:确保您在使用由可信任的根证书颁发机构颁发的有效的、非过期的安全证书。
To guard against such an attack, root and signer certificates based on the MD5 hash should not be trusted.
为防止此类攻击,基于md5哈希的根证书和签名者证书不应受信任。
The screenshot shows all trusted root CA certificates in a default Windows 2003 Server plus two additional certificate which have been added so far (CS Germany CA and Applix).
这个屏幕图显示在默认的Windows 2003Server中所有可信的根CA证书,还有目前已经添加的两个证书(CS Germany CA和 Applix)。
You still control the certificates, but you do not control the root certificate.
您仍然可以控制证书,但是不能控制根证书。
Expand Certificates, Trusted Root certificate Authority and repeat Step 4 above to import the certificate into the trust ca store as well.
展开Certificates,TrustedRootCertificateAuthority,并重复上面的步骤4,将证书导入到信任ca存储。
Because this root ca certificate is located in your Trusted root Certification Authorities store, this computer will now trust any certificates issued by your AD CS server.
因为此根ca证书的位置在受信任的根证书颁发机构存储中,此计算机现在将信任由ADCS服务器颁发的所有证书。
Within the Trusted Root Certification Authority folder, find and expand the Certificates folder.
内部的受信任的根核证机关的文件夹,寻找和扩大证书的文件夹。
Within the Trusted Root Certification Authority folder, find and expand the Certificates folder.
内部的受信任的根核证机关的文件夹,寻找和扩大证书的文件夹。
应用推荐