Your browser does not support HTML5 local storage or you have disabled it. Some functionality on this site, including saving your privacy settings and offering you special discounts, uses local storage and may not work with local storage disabled. We recommend allowing the use of local storage in your browser. In some browsers, it is the same setting used for disabling cookies.
On the CA Certificates page of the Settings dialog you can manage the certificates of your trusted certification authorities (CA). For more information on certificates, see SSH Tectia Client/Server Product Description.
Figure : Trusted Certification Authorities
CA certificate list
The available CA certificates are shown on the CA certificate list at the top of the CA Certificates page.
The following fields are displayed on the CA certificate list:
The Issued To field shows the certification authority to whom the certificate has been issued.
The Issued By field shows the entity who has issued the CA certificate.
The Expiration Date field shows when the CA certificate will expire.
Use Expired CRLs
This field shows how long expired CRLs are used (time in seconds).
The following buttons can be used to manage the CA certificates:
Click Import... to import a CA certificate from an external file. The Import Certificate - Select File dialog opens, allowing you to locate the certificate file.
Click View... to display the contents of the selected CA certificate.
Click Modify to edit the selected CA certificate.
Click Delete to remove the selected CA certificate.
Select the Disable check box to prevent the use of a certificate revocation list (CRL). A CRL is used to check if any of the used server certificates have been revoked.
Note: Disabling CRL checking is a security risk and should be done for testing purposes only.
Endpoint Identity Check
Specifies whether the client will verify the server's hostname against the Subject Name or Subject Alternative Name (DNS Address) in the server's certificate.
If this check box is not selected, the fields in the server host certificate are not verified and the certificate is accepted based on validity period and CRL check only. Note that this is a possible security risk, as anyone with a certificate issued by the same trusted CA that issues the server host certificates can perform a man-in-the-middle attack on the server if a client has the endpoint identity check disabled.
OCSP Responder URL
The OCSP Responder Service provides client applications a point of control for retrieving real-time information on the validity status of certificates using the Online Certificate Status Protocol (OCSP). For more information on OCSP, see RFC 2560.