
Section 5 | IP Access Configuration & Operation |
| Section 5 | IP Access Configuration & Operation |
The
This certificate and the underlying secret key is the same for all
However, it is possible to generate and install a new certificate that is unique for a particular
The following steps are necessary to create and install an SSL certificate for the
1.Create an SSL Certificate Signing Request using the panel shown in the screen shot above. You need to fill out a number of fields that are explained on the next page. Once this is done, click on the Create button to initiate the Certificate Signing Request generation. The CSR can be downloaded to your administration machine with the Download CSR button (see the illustration on the next page).
2.Send the saved CSR to a CA for certification. You will get the new certificate from the CA after a more or less complicated traditional authentication process (depending on the CA).
3.Upload the certificate to the
After completing these three steps, the
Note: If you destroy the CSR on the KVM over IP module there is no way to get it back! In case you deleted it by mistake, you have to repeat the three steps as described previously.
Common nameThis is the network name of the
This field is used for specifying to which department within an organization the
The name of the organization to which the
The city where the organization is located.
State/ProvinceThe state or province where the organization is located.
Country (ISO code)The country where the organization is located. This is the
Some certification authorities require a challenge password to authorize later changes on the certificate (e.g. revocation of the certificate). The minimal length of this password is 4 characters.
54 | 55 |