Alibabacloud.com offers a wide variety of articles about how to create x509 certificate, easily find your how to create x509 certificate information here online.
Research on creating an X509 Certificate and obtaining the certificate key
Author: Xiao Bo
Personal blog: http://blog.csdn.net/eaglet; http://www.cnblogs.com/eaglet
2007/7 Nanjing
Background
The format of the server SSL digital certificate and the
Introduction (Creating a generated certificate can only be used for test use.) If you want to use a self-signed certificate, you can only issue certificates to the CA authority for two-way authentication to use.The use of HTTP (Hypertext Transfer)
The original is in http://bbs.pediy.com/archive/index.php?t-97663.html, but I think this article is very good, I copied down to make my notes withI. Analysis of X509 certificate 1. Read the certificate data from the certificate file on diskunsigned
. How to operate digital certificate in net
. NET provides us with two main classes for manipulating digital certificates, divided into:System.Security.Cryptography.X509Certificates.X509Certificate2 class, each instance of this class can represent
In Internet-based WCF services, security is a very important part. There are many security modes in WCF. This time, we will consider using a limited server environment (such as a virtual host) to configure the message security mode for X509
X.509 digital certificate is the most convenient authentication method in the Internet environment.
1. Create a digital certificate
X509 certificates can be used by the Certificate Authority (such as Verisign inc.exe to buy or use the
A Cer certificate also needs a signature to prevent the CER certificate from being tampered.
There are two types of certificates:
1. Root Certificate
2. The sub-certificate issued by the root certificate.
The root certificate is special. It is self-
Transferred from:
Http://rhythm-zju.blog.163.com/blog/static/310042008015115718637/
All rights reserved. If you need to reprint it, please indicate the source
I have studied SSL/TLS some time ago and read the English version of Eric rescorla's SSL
said earlier that message digest is used to verify data integrity, and symmetric and asymmetric encryption is used to guarantee data confidentiality. Data signatures are used for the anti-repudiation of data, so the ultimate weapon that sets
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.