Your browser does not allow storing cookies. We recommend enabling them.

PreviousNextUp[Front page] [Index]

Updating a Changed Request

All modifications to request data are automatically updated into Database when the request is accepted. Data can also be manually updated by clicking the Update button in the bottom of the page.

When the operator clicks either the Accept or the Reject button, the request's status is updated accordingly, the last search is refreshed and its results are displayed automatically. Note that now the just-processed request has different status and might be removed from the search results.

Accepting the certification request will create a certificate with the modified request as a template. Subject and Authority key identifiers will be assigned during this process (the SHA-1 hash over the corresponding DER encoding of public keys is the method used).

After the approval, the certificate is stored in the internal Database and published to a directory server (if so configured). Also the approval operation, including the operator login name, is stored in the Database to enable audit trail of the certificates. If a request is denied, the same request cannot be approved later.

A Poll reference ID for the request is shown on the request processing page. This ID needs to be given when polling for the approved certificate, for example, via the Web Enrollment Service.

Clicking the Postpone button sets the request to postponed status. This means that it will be removed from pending requests but can otherwise be manipulated normally.

The Reset button at the bottom of the page resets the page to the values found in the Database and effectively cancels all modifications done by the operator after the last update.

The View Log option displays recent log events related to this request. Copy Request adds a new request to the Database with identical information. This can also be done to already accepted or rejected requests.

PreviousNextUp[Front page] [Index]




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now