This article mainly describes how to add multiple Web sites in IIS and use the same digital signing certificate (win7+iis7.5)
IIS adds a site site1 with a port number of 80 and a host name of NULL. Such as:
Create certificate Iis->server certificates–>create self-signed Certificate, enter certificate titleSuch as:
Bind a certificate, such asNote: Step 5 The selected certificate name should be "*.ucredit", here is a small error.
Open t
ca.key-in web1.csr-out web1.crtWhere the policy parameter allows signed CAs and web site certificates to have different countries, place names and other information, the days parameter is the signature time limit.Finally, paste the contents of the CA.CRT into the back of WEB1.CRT. This is more important! Because you do not do this, there may be some browsers that are not supported.5. Configure Nginx to support HTTPSAdd the configuration in the nginx.
OverviewThe data transmitted by the HTTP protocol is unencrypted, so it is very insecure to use the HTTP protocol to transmit private information. To ensure that these private data can be encrypted, Netscape designed the SSL (Secure Sockets Layer) protocol to encrypt the data transmitted by the HTTP protocol, which led to the birth of HTTPS. HTTPS protocol is a network protocol built by the SSL+HTTP protocol which can encrypt transmission and authentication, and is more secure than HTTP protocol
How to share certificates in team developmentIn team development, you need to share the certificate file and the private key. If you download only the certificate file from provisioning portal without the private key,Xcode prompts an error:Unable to code design using identities in this team:no private ke Ys available (Unable to code-sign in the team: No valid private key found). Workaround: (1) Open the Keychain program and select the ' key ' categor
on Exchange Server2007, apply the SSL certificate that is requested by the Times following error, prompting privatekeymissingAt Line:1 char:27650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M01/83/6A/wKioL1dzL9ahR0wcAACCWyzUCXY193.png "title=" 1.png " Style= "Float:none;" alt= "Wkiol1dzl9ahr0wcaaccwyzucxy193.png"/>If prompted, you need to repair the certificate to apply the success, found The Repair certificate method is as follows:Repair damaged Certificate Store:1) Open MMC (Microsoft
1. Remove redundant certificates from Xcode provisioning profileManual removal:Xcode6 Provisioning Profile Path:~/library/mobiledevice/provisioning Profiles2. Clean up the cache garbage generated by Xcode compilation project(Xcode is permanent, will generate a lot of project compile cache, occupy a lot of hard disk space, at this time need to clean up the directory)Manual removal:Xcode compiles the project cache garbage directory:~/library/developer/x
certificate (Certificates)Development Test Certificate real-machine test Production uploading AppStore Packaging certificateAPNS Remote Push Certificate: Development productionAPPID: Identify the uniqueness of the app Bundleiddescription File (Provisioning Profiles)Test Profile: 1. Test Certificate 2. APPID 3. Test equipmentpublish with a profile: 1. Publish certificate 2. APPIDEquipment: 100 units per year for each accountReal Machine test: Test Cert
more secure by not passing any information about symmetric keys during the negotiation process.3. The client authenticates the server using a certificate. Certificates are generally issued by other agencies, which contain the public key of the certificate and hash the contents of the certificate at the end and encrypt the hash value with the issuing authority's own private key (electronic signature). The client can decrypt the electronic signature at
Over half of the past 2014, we have already seen many new top-level domains in the Domain Name field, for example. online ,. ,. club ,. move ,. XYZ ,. wang and so on.According to overseas media news, on April 9, June 1, the new top-level domain name ". XYZ" was opened for public registration, and nearly 18000 of registration volume was obtained on that day. At present, the registration volume of ". XYZ" quickly exceeded 30 thousand, reaching 38153, ranking fourth in the new top-level domain name
SHA1 deprecation strategy for signature algorithm for SSL certificate and Code signing certificate, Microsoft has set a different schedule: 1, allWindowsTrusted Root Certification authorities(CA)from .years1Month1the date must cease to issue newSHA1Signature AlgorithmSSLCertificate and Code signing certificate; 2, forSSLcertificates,Windowswill be in .years1Month1stop support from daySHA1certificate. In other words: any previously issuedSHA1The certificate must be replaced withSHA2certificate;
When developing a mobile website, we must use the "ssl client certificate" to deploy encrypted websites that are only accessible to specific mobile phones ",
Does all mobile phone systems support ssl client certificates well? Let's see how to use various mobile phone systems to access websites with ssl client certificates.
IPhone, Android 4.0 or above, BlackberryThe built-in browsers of
Compile a function and output 1 ~ Between 1000, all certificates that can be divided by 3, 5, and 7 at the same time, and each line is required to display 6 such numbers
105,210,315,420,525,630,735,840,945,A total of 9
Compile a function and output 1 ~ Between 1000, all certificates that can be divided by 3, 5, and 7 at the same time, and each line is required to display 6 such numbers
,Authentication fingerprint(MD5): 20: E1: 74: 4b: 0b: 35: 33: FF: Be: 2D: 9d: B5: 31: AB: 3B: De
The content in BBB. jks is as follows:
Keytool-keystore BBB.Jks-list-alias Tomcat enter the keystore password: Tomcat, 2012-12-2, trustedcertentry,Authentication fingerprint(MD5): 20: E1: 74: 4b: 0b: 35: 33: FF: Be: 2D: 9d: B5: 31: AB: 3B: De
The difference is visible from the two outputs above. One is privatekeyentry and the other is trustedcertentry.
In fact, the keystore stores two types of
How to use Java code to automatically Import SSL certificates to Java's key storage file (keystore), sslkeystore
In the process of developing or using SSL, many software products need to provide java keystore, especially some Java-based middleware Products.The general practice is to use the built-in JDK tool command (keytool), for example, the following example
Keytool-import-v-alias EnTrust2048-file D: \ certs \ EnTrust2048.cer-keystore D: \ certs \
Solution for failure of all certificates in the iOS-key string (invalid issuer of the certificate), ios-Key
Today, I used Xcode to package the IPA file to my colleagues. When the result showed that the import was prompted, I was prompted for the certificate missing. After finding the file for a long time, I did not find any problem. Then I opened the key string and found that all the certificates were inva
verify the certificate. If it is correct, it will download the default page index.html.
Note: The trust manager determines whether the remote certificate is trustworthy. It uses the following rules:
1. If the system attribute of javax.net. SLL. truststore specifies a trusted library, the trust manager checks the certificate using the provided file. If the system property exists but the specified file does not exist, no trust library is used and a certificateexception is thrown.
2. If the system
Tags: multi-domain certificate OpenSSL sign multi-domain certificate nginx two-way authentication SSL multi-domain Certificate
OpenSSL self-built ca signs a Single Domain Name Certificate by default, because a single server has multiple HTTPS domain names, it is much easier to sign a multi-domain certificate, today I have been looking for a long time, except for some websites that sell certificates that have SCR tools that can add "User backup names",
"save to disk", then the user e-mail address can be a random name, the common name is the best to make a meaningful distinction between the name, CA e-mail address to fill in their own mailbox. The user email address can be the same as the CA e-mail address, so you can accept the message anyway.Save the file to the desktop (for easy querying), the first. Cersigningrequest. The other two are generated by the following steps: A. cer is the certificate that waits until
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.