Download User Manual - GENESYS SOFTWARE
Transcript
Using the Security System 5.7.6. CA Management A Certificate Authority (CA) certifies the authenticity of public keys. This ensures that the certificate used in a VPN connection really belongs to the endpoint, and not to an attacker. The CA Management menu allows you to create and manage your own X.509 Certificate Authority (CA). The authority will verify the validity of X.509 certificates exchanged during IPSec VPN connections. The relevant information is stored in the X.509 certficates. But you can also use certificates, signed by commercial providers, such as VeriSign. Note: Every certificate has unique CA with respect to its identifying information (Name, Firm, Location, etc.). If the first certificate is lost, a second cannot be generated to replace it. The CA Management menu allows you to manage three distinct kinds of certificates, which are used for different purposes. The three certificates differentiate themselves according to use, and, importantly, whether or not the Private Key is stored: CA (Certificate Authority) Certificate: If a CA is saved without private key, it can be used for the authentication of the host and user certificate of incoming IPSec connections: this type of CA is called a Verification CA. If a CA saves its private key, it can be used to sign certificate queries, in order to produce a valid certificate. This CA is called a Signing CA. The system can contain a number of Verification CAs, but only one Signing CA. Host CSR (Certificate Signing Request): This is a request to have a certain certificate signed. When it is given to a Signing CA - and the CA verifies the identity of the owner – the CA sends back a fullyformed and signed Host Certificate. 290