EasyManuals Logo

HP 5920 Series Configuration Guide

HP 5920 Series
424 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #209 background imageLoading...
Page #209 background image
198
You can remove the CA certificate, local certificate, or peer certificates in a PKI domain. After you
remove the CA certificate, the system automatically removes the local certificates, peer certificates, and
CRLs in the domain.
You can remove a local certificate and request a new one when the local certificate is about to expire or
the certificate's private key is compromised. To remove a local certificate and request a new certificate,
perform the following tasks:
1. Remove the local certificate.
2. Use public-key local destroy to destroy the existing local key pair.
3. Use public-key local create to generate a new key pair.
4. Request a new certificate.
To remove a certificate:
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Remove a certificate.
pki delete-certificate domain domain-name { ca |
local | peer [ serial serial-num ] }
If you use the peer
keyword without
specifying a serial
number, the command
removes all peer
certificates.
Configuring a certificate access control policy
Certificate-based access control policies allow you to authorize access to a device (for example, an
HTTPS server) based on the attributes of an authenticated client's certificate.
A certificate-based access control policy is a set of access control rules (permit or deny statements), each
associated with a certificate attribute group. A certificate attribute group contains multiple attribute rules,
each defining a matching criterion for an attribute in the certificate issuer name, subject name, or
alternative subject name field.
If a certificate matches all attribute rules in a certificate attribute group associated with an access control
rule, the system determines that the certificate matches the access control rule. In this scenario, the match
process stops, and the system performs the access control action defined in the access control rule.
The following describes how a certificate access control policy verifies the validity of a certificate:
• If a certificate matches a permit statement, the certificate passes the verification.
• If a certificate matches a deny statement or does not match any statements in the policy, the
certificate is regarded invalid.
• If a statement associates with a non-existing attribute group, or the attribute group is configured
without any attribute rules, the certificate matches the statement.
• If the certificate access control policy referenced by a security application (for example, HTTPS)
does not exist, all certificates in the application pass the verification.
To configure a certificate access control policy:

Table of Contents

Other manuals for HP 5920 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HP 5920 Series and is the answer not in the manual?

HP 5920 Series Specifications

General IconGeneral
BrandHP
Model5920 Series
CategorySwitch
LanguageEnglish

Related product manuals