
DMA OperationsGuide  Certificate Procedures
40 Polycom, Inc.
See also: 
“Security Certificates Overview” on page 33 
“Certificate Settings” on page 36 
“Certificate Procedures” on page40 
Certificate Procedures Certificate procedures include the following: 
•Install your chosen certificate authority’s public certificate, if necessary, so 
that the Polycom DMA system trusts that certificate authority. 
•Create a certificate signing request to submit to the certificate authority. 
•Install a public certificate signed by your certificate authority that 
identifies the Polycom DMA system. 
•Remove a signed certificate or a certificate authority’s certificate. 
Table 3-4 Sections in the Certificate Details dialog box
Section  Description
Certificate Info Purpose and alias of the certificate. 
Issued To  Information about the entity to which the certificate was 
issued and the certificate serial number. 
Issued By  Information about the issuer. 
Validity  Issue and expiration dates. 
Fingerprints  SHA1 and MD5 fingerprints (checksums) for confirming 
certificate. 
Subject Alternative 
Names 
Additional identities bound to the subject of the 
certificate. 
For the Polycom DMA system, this should include the 
virtual and physical FQDNs, short host names, and IP 
addresses of the system. 
Extended Key Usage  Indicates the purposes for which the certificate can be 
used. 
The Polycom DMA system’s certificate is used for both 
server and client connections, so this should always 
contain at least serverAuth and clientAuth.