Open public certificate issuing systems.
开放式公共证书发布系统。
You can now import the public certificate for the JMS Client.
现在您可以导入用于JMS客户机的公共证书。
The following SOAP request uploads a public certificate to the XB60.
下面的SOAP请求将一个公共证书上传到 XB60。
You end up with something that contains a public certificate and a private key.
您最终将获得包含公开证书和私钥的密钥存储库。
After the public certificate is loaded, the private certificate must be loaded.
在加载公用证书之后,就必须加载私有证书了。
To sign a portion of an XML document, you need a private key and a public certificate.
要对XML文档的内容进行签名,您需要一个私钥和一个公开证书。
I'll start with the public certificate, which is the one that gets sent to the client.
我们将从公用证书开始介绍,这个证书会发送给客户机。
Note that a public certificate called JMSClient is now added to the queue manager's key repository.
请注意,名为 JMSClient 的公共证书现在被添加到队列管理器的密钥资源库中了。
You also need to add the public certificate from the JMS Client; this is required to authenticate the JMS Client.
您还需要添加来自于JMS客户机的公共证书;
The problem is that the information is just a description of the certificate (information that is available in the public certificate).
问题是,这一信息仅仅是对证书的描述(在公共证书中可以找到的信息)。
This part is needed during the handshake, because the client will be sending information to the server encrypted to the public certificate.
这是在握手过程中需要的,因为客户机在这个过程中正将这些信息发送给对公钥进行加密的服务器。
If you want to use default SSL Settings, add the public certificate of WebSphere Application Server to the default trust store as shown in Figure 27.
如果希望使用缺省ssl设置,请将WebSphereApplicationServer的公用证书添加到缺省信任存储区,如图27中所示。
The queue manager has now been assigned a personal certificate with which it can be authenticated, and it has access to the public certificate required to authenticate the JMS Client (see Figure 11).
现在已经给队列管理器分配了一张用来认证它的证书,该队列管理器拥有对公共证书的访问权,这个公共证书是认证JMS客户机所必需的(请参见图11)。
For this purpose, I recommend using a common private key and the corresponding public key certificate for SOAP-DSIG and SSL.
为实现这一目的,我建议在SOAP -DSIG和SSL中使用一个公共专用密钥和相应的公用密钥证书。
Extract the public key of the new certificate.
提取这个新证书的公共密匙。
If access is based entirely on self-signed certificates, deleting the public key of a certificate from the trust store revokes its access.
如果访问完全基于自签名证书,则从信任存储区中删除证书的公钥将撤销其访问权。
It consists of a client with no public key certificate, accessing a server with a public key certificate.
其包括一台没有公钥证书的客户机,该客户机通过公钥证书访问服务器。
This command specifies that a personal certificate (public/private key pair) be generated in a keystore that is to be located in the current directory.
该命令指定在一个位于当前目录下的密钥库中生成一张个人证书(公钥/私钥对)。
However, we'll need to configure the client to trust the certificate authority (ca) that signed the server's public key certificate.
然而,我们需要将客户机配置为信任签署服务器的公钥证书的认证中心(CA)。
The identity may be represented as the name of the recipient, the public key certificate of the recipient, or in some other way.
该身份可以用接收方的名字、接收方的公用密钥证书或以其它方式来表示。
The receiver USES the ca's certificate to verify the sender's certificate, ascertaining that the public key contained in the certificate truly belongs to the owner.
接收方用CA的证书来验证发送方的证书,确定证书中所包含的公钥确实属于所有者。
The signature verifier must have access to the public key certificate that contains the public key associated with the private key used to produce the signature.
签名验证者必须有权使用包含与用于生成签名的私钥关联的公钥的公钥证书。
Access the ca public key and test the client certificate.
访问CA的公共密匙并测试客户端证书。
The public part of the certificate is created as an.arm file (see Figure 2).
证书的公开部分将创建为. arm文件(请参见图2)。
Export the server's public key certificate so that it can be imported into the client's trust store, by typing the following command
通过键入下面的命令,导出服务器公钥证书以将其导入到客户机信任存储中
Enter name for public crypto certificate, ws-dsig-receiver-public.
输入公共加密证书的名称WS - dsig - receiver - public。
Because our client certificate will be self-signed, we'll need to configure the client's public key certificate as a trusted signer for the server.
因为我们的客户机证书将是自签署的,所以我们需要将客户机的公钥证书配置为服务器受信任的签署者。
You must have already created the server key store and exported the server's public key certificate using the commands in the server section above before creating the client trust store.
在创建客户机信任存储之前,必须已经使用上面服务器部分中的命令创建服务器密钥存储并导出服务器公钥证书。
We need to create a trust store for the client with the server's public key certificate in it.
我们需要使用客户机中的服务器公钥证书来为客户机创建信任存储。
In our case, because the server's certificate will be self-signed, we need to configure the server's public key certificate as a trusted signer for the client.
在我们的示例中,由于服务器的证书是自签署的,我们需要将服务器的公钥证书配置为客户机受信任的签署者。
应用推荐