In these examples, you'll use a self-signed certificate.
在这些例子中,我们将使用自己签名的证书。
In case of a self signed certificate the server certificate is required.
对于自签署证书,需要服务器证书。
Use environment-specific tools to generate a self-signed certificate.
使用特定于环境的工具生成一张自签署的证书。
Figure 10 also shows the details of the ca's self-signed certificate.
图10还显示了CA的自签名证书的详细信息。
Select Personal certificates and click Create a self-signed certificate.
选择personalcertificates并单击Createa self - signed certificate。
The gateway must have a public-private key pair and a signed certificate.
网关必须有一个公有、私有密匙对以及签名的证书。
Create a self-signed certificate using the administrative console as follows.
使用管理控制台创建自签名证书,具体操作如下。
The security alert shown below displays if you are using a self signed certificate.
如果您正在使用自签名证书,则会显示如下安全警报。
Signature Algorithm: Algorithm to be used to sign the self-signed certificate.
SignatureAlgorithm:签署自签名证书所使用的算法。
When you create a private key, it creates the key pair and the self signed certificate.
创建私钥后,它将创建密钥对和自签署证书。
By default, Community Edition Certification Authority USES a self-signed certificate.
缺省情况下,CommunityEdition证书颁发机构使用一个自签名证书。
The trust store entry for a self-signed certificate matches one and only one certificate.
自签名证书的信任存储区项与一个且仅与一个证书匹配。
For WebSphere Application Server, we will use a self-signed certificate, called jmsclient.
对于WebSphereApplicationServer,我们则使用一个自签署证书,名为jmsclient。
This means you can verify exactly one certificate — the self-signed certificate created for the peer.
这意味着您可以准确地检验一个证书——为对方创建的自签署证书。
For this example configuration in this article, we are using the self-signed certificate in TXSeries.
对于本文中的示例配置,我们使用了TXSeries中的自签名证书。
Now walk through creating a self-signed certificate for distribution to a server using iKeyman V7.0.3.28.
下面使用iKeymanV7.0.3.28 来逐步地创建一个自签名的证书以便分发到服务器。
The quickest way to set up a keystore is to create your own certificate, called a self-signed certificate.
设置密钥存储库的最快方法是创建您自己的证书,称为自签名证书。
Create a self-signed certificate from the WebSphere ESB server and import into the Vista server key store.
从WebSphereESB服务器创建一个自签名证书,把它导入Vista服务器密钥存储。
It USES a default signature algorithm, SHA1 with DSA, to create a self-signed certificate valid for 180 days.
它使用默认的签名算法(SHA1和DSA)创建一个带有自我签名的证书,有效期为180天。
In case of a ca signed certificate, the ca certificate of the ca which signed the server certificate is required.
对于CA签署的证书,需要签署服务器证书的CA的ca证书。
Since this example USES a serial number '0' for the ca's self-signed certificate, this field shows a value of 0.
由于本例中对CA的自签名证书使用序列号“0”,因此此字段显示的值为0。
For the demonstration, we will use self-signed certificate for transferring the key from the server to the client.
为了演示我们将使用自签名证书将密匙从服务器传输到客户端。
If the trusted list is small (perhaps containing only one self signed certificate), this attack becomes very difficult.
如果受信任列表很小(或许仅包含自签署证书),则发起此类攻击将很困难。
In the case of a self-signed certificate, it is the certificate's own public key that must exist in the trust store.
如果是自签名证书,则该证书本身的公钥必须存在于信任存储区中。
This is because WebSphere comes only with a self-signed certificate that the browser cannot validate if it is correct.
这是因为WebSphere只是带有一个自己签署的证书,浏览器不能验证它是否正确。
This means that each can be used to verify exactly one certificate -- the self-signed certificate created for the peer.
这意味着只能使用它们检验一个证书 ——为对方创建的自签名证书。
For this reason, valid public certificates are recommended. To generate and use a self-signed certificate, follow these steps.
由于这个原因,建议使用有效的公共凭证。
The default SSL settings use a self-signed certificate, and this can be changed, refer to the WebSphere documentation for that.
默认的SSL设置使用一个自签名的证书,可以根据WebSphere文档中的说明修改这个设置。
You can use iKeyman to create a new self-signed certificate as we've just shown, or add a CA certificate to your own truststore.
您可以使用iKeyman 来创建新的自签名证书,如我们刚才所示,或是向您的信任库中添加CA 证书。
In the extreme with self-signed certificates, we can create a situation where there is only one signer: the self-signed certificate.
在自签署证书的极端情况下,我们可以创建只有一个签署者的情形:只有一份的自签署证书。
应用推荐