Deleting root certificates invalidates the trusted root certification authorities.
删除根证书将使受信任根证书颁发机构失效。
A certificate chain for the signature certificate, but not the trusted root certificate.
用于签名证书而不是可信根证书的证书链。
A certificate chain for the signature certificate, including the trusted root certificate.
用于签名证书(包含可信根证书)的证书链。
A certificate chain for the signature certificate, including the trusted root certificate.
用于签名证书而不是可信根证书的证书链。
In the list that appears, find and expand the Trusted Root Certification Authority folder.
在名单中出现,寻找和扩大受信任的根证书权威文件夹。
Within the Trusted Root Certification Authority folder, find and expand the Certificates folder.
内部的受信任的根核证机关的文件夹,寻找和扩大证书的文件夹。
If the trusted root ca has a CRL provided check that the certificate is not listed there as being revoked.
如果可信根ca提供CRL,要确认撤消的证书列表中不包含这个证书。
Again this requires Windows to trust the certificate which implies to have the correct trusted root ca imported.
这要求Windows信任此证书,意味着必须导入正确的可信根ca。
Workaround: Ensure that you are using valid, non-expired security certificates issued by a trusted root certification authority.
处理:确保您在使用由可信任的根证书颁发机构颁发的有效的、非过期的安全证书。
Expand Certificates, Trusted Root certificate Authority and repeat Step 4 above to import the certificate into the trust ca store as well.
展开Certificates,Trusted RootCertificateAuthority,并重复上面的步骤4,将证书导入到信任ca存储。
If for some reason they are not placed in there trust cannot be established although Windows may show the certificate as a trusted root ca.
如果由于某种原因它们没有放在那里,即使Windows把证书显示为可信根ca,也无法建立信任。
Select the trusted root certificate or any other certificate category accordingly and import the server certificate that you had created into it.
选择可信的根证书或任何其他证书类别,把刚才创建的服务器证书导入到其中。
The commands you use vary slightly depending on whether the certificate authority (ca) that issued your certificate is part of a client's trusted root.
您可以使用的命令会略有不同,这取决于发行证书的证书颁发机构(ca)是否是客户端受信任的根的一部分。
If you've done everything correctly, you should soon find the AD CS server's root certificate in the Trusted root Certification Authorities store on a computer.
如果您已经一切正常,您应很快发现一台计算机上的受信任的根证书颁发机构存储中的ADCS服务器的根证书。
The screenshot shows all trusted root CA certificates in a default Windows 2003 Server plus two additional certificate which have been added so far (CS Germany CA and Applix).
这个屏幕图显示在默认的Windows 2003Server中所有可信的根CA证书,还有目前已经添加的两个证书(CS Germany CA和 Applix)。
Because this root ca certificate is located in your Trusted root Certification Authorities store, this computer will now trust any certificates issued by your AD CS server.
因为此根ca证书的位置在受信任的根证书颁发机构存储中,此计算机现在将信任由ADCS服务器颁发的所有证书。
If your certificate was issued by one of these trusted roots, or by a ca that chains to one of these trusted roots, you can add the certificate to the client's trusted root store.
如果证书由这些受信任的根之一或由链接到这些受信任的根之一的CA发行,则可以向客户端受信任的根存储区中添加证书。
If, on the other hand, your certificate was not issued by one of these trusted roots, you must add the certificate to both the client's trusted root store and trusted Publisher store.
另一方面,如果您的凭证不由其中一个受信任的根核发,就必须对用户端之受信任的根存放区和受信任发行者存放区都加入凭证。
To guard against such an attack, root and signer certificates based on the MD5 hash should not be trusted.
为防止此类攻击,基于md5哈希的根证书和签名者证书不应受信任。
On the public Internet, VeriSign's root certificate is implicitly trusted by Firefox long before you go to any website.
在公共网络中,在你还未上任何网站之前,Firefox就已经隐含地信任了VeriSign的根证书。
The basic consider of the trusted compute is: at first structuring a trust root, the credibility of which is guaranteed by the physics security and management security.
可信计算的基本思路是:首先构建一个信任根,信任根的可信性由物理安全和管理安全确保。
The basic consider of the trusted compute is: at first structuring a trust root, the credibility of which is guaranteed by the physics security and management security.
可信计算的基本思路是:首先构建一个信任根,信任根的可信性由物理安全和管理安全确保。
应用推荐