Certificate file extensions and types

When installing or exporting a certificate, EAServer Manager | Certificates folder determines the type of certificate based on the file extension. The extensions and the type of certificates they represent are:

NoteTransferring versus importing and exporting: Transferring user certificates and private keys allows you to use the certificate and private key in the target security environment. Exporting, installing, and marking a CA certificate trusted in the target security environment simply allows you to accept certificates that have been signed by that CA.

StepsInstalling and exporting certificates

EAServer Manager | Certificates folder allows you to export or import (install):

  1. Certificates signed by the test CA.

  2. Certificates signed by another CA.

  3. Certificate chains – a certificate chain is a certificate that has been signed by a CA, which in turn has been signed by a CA, and so on. The certificate contains information that traces the path of the certificate back to the root CA (the original signer).

  4. A signer’s (CA) certificate. You need to install a signer’s certificate and mark it as trusted so that EAServer accepts certificates signed by that CA.

  5. User certificates and their corresponding private key using the PKCS #12 standard.

    PKCS #12 is an RSA standard that specifies a transfer syntax for personal identity information. EAServer’s support of the PKCS #12 standard allows you to move user certificates and private keys between systems and programs that support the PKCS #12 standard, such as Netscape Communicator and Microsoft’s Internet Explorer.

    Sybase’s PKCS #12 implementation allows you to transfer certificates and private keys in either a domestic format (128-bit encryption) or international format (40-bit encryption). You can find more information about domestic and international support in “Configuring security profiles”.

StepsInstalling a certificate

  1. Select the folder that corresponds to the type of certificate you are installing.

  2. Select File | Install Certificate.

  3. Either paste the entire contents of the certificate into the box (base64 encoded certificates only), or click the Import from File box.

    If you select Import from File, the cut and paste area is dimmed. Use the browse feature to locate the certificate.

  4. Click Install. If the certificate is of type .crt or .p7c, it is installed. If the file is a PKCS #12 type (has either a .p12 or .pfx extension) the PKCS #12 Certificate/Private Key window displays:

    1. Enter the password that allows access to the file. This is the password you entered when you exported the certificate and private key.

    2. To export the certificate and its private key at a later time you must check the Mark private key as exportable check box, which is, by default, already selected.

    3. Click Done.

    The certificate is assigned to a folder based on its type:

Once installed, you can assign a user certificate to a security profile. For more information, see “Configuring security profiles”.

After installing a signer’s certificate, mark it as trusted if you want to accept certificates signed by that signer. See “Viewing certificate, trust, and export information” for more information.

StepsExporting a certificate

  1. Select the Certificates folder that contains the certificate to be exported.

  2. Highlight the certificate to be exported.

  3. Select File | Export Certificate.

  4. From the Export Certificate wizard, select the format type of the certificate to be exported.

    If you have chosen Export Certificate from the User Certificate folder, and you selected “Mark Private Key Exportable” when you generated the key pair and requested a certificate, the PKCS #12 option is available.

  5. Depending on the type of certificate you select, one of two windows appears:

  6. Click Finish to export the certificate to the file you specified.

Advanced PKCS #12 options

The advanced screen allows you to modify the PKCS #12 options listed below. The default settings are appropriate in most cases and should only be modified by experienced users:

StepsViewing certificate, trust, and export information

You can view the information about the certificates that you have installed and your own certificates, including identifying, trust, and usage information. To view certificate information:

  1. Select the folder for the type of certificate you want to view:

    • User

    • CA

    • Trusted

    • Other

  2. Select the certificate you want to view.

  3. Select File | Certificate Info.

The Certificate Information dialog appears. Use the scroll bar to view all of the information.

The Certificate dialog includes a Trusted Certificate check box. Based on the policies of your organization, trustworthiness of the certificate signer, and other considerations, specify whether or not to mark a certificate as trusted. Only CA certificates can be marked as trusted or untrusted.

Certificates that are marked as trusted display when you select the Trusted folder.

For user certificates, an Exportable Private Key check box is provided. If this box is checked, you can export the certificate, along with its private key. To prevent future exports, you can uncheck the box. Once unchecked, the private key can never be exported. See “Installing and exporting certificates” for more information.

StepsVerifying a certificate

EAServer Manager | Certificates folder verifies the signature, expiration date, and validity of a certificate. If the certificate is part of a chain of certificates, it verifies each certificate in the chain.

A chain involves more than one certificate. Each certificate in the chain is signed by the preceding certificate. For the certificate to be verified, the entire chain must be verified. If a peer offers a certificate for authentication that belongs to a chain, at least one CA within the chain must be trusted for the certificate to be accepted.

To verify a certificate:

  1. Select the folder for the type of certificate you want to verify.

  2. Highlight the certificate you want to verify.

  3. Select File | Verify.

A dialog appears that either verifies the certificate or informs you that verification was unsuccessful. Do not use certificates that fail verification.

StepsRenaming a certificate

Only the label of the certificate is changed. The content of the certificate remains the same.

  1. Select the folder type for the certificate you want to rename.

  2. Highlight the certificate to rename.

  3. Select File | Rename Certificate.

  4. Enter the new name of the certificate. Click Done.

StepsDeleting a certificate and its associated private key

EAServer Manager | Certificates folder allows you to delete your own certificates and associated private keys, the test CA, and certificates that you have obtained from others.

  1. Select the folder for the type of certificate you want to delete.

  2. Highlight the certificate you want to delete.

  3. Select File | Delete Certificate.

NoteIf you delete the test CA, certificates that were signed by the test CA are no longer useful. In this case, you need to generate a new test CA and new certificates signed by the new test CA to test your security scenarios.