How to create and administer X.509 Certificate chains, Part I


X.509 certificates are widely used for data transport security and integrity assertion. The first part describes the creation of a private Certificate Autority (CA) and host certificates, while the second part deals with administration of certificates. The third part will enable you to build your own administration tools …

Continue reading