Retrieve from port

 

+

Search Tips   |   Advanced Search

 

Use this page to retrieve a signer certificate from a remote SSL port. The system connects to the specified remote SSL host and port and receives the signer during the handshake using a trust manager. The signer SHA hash displays for validation and, if approved by an administrator, is added to the currently selected trust store.

To view this console page, click...

Security | SSL certificate and key management | Manage endpoint security configurations | {Inbound | Outbound} | ssl_configuration | Related items | Key stores and certificates | key store | Signer certificates | Retrieve from port

 

Configuration tab

Host

Specify the host name to which you connect when attempting to retrieve the signer certificate from the SSL port.

Data type: Text

Port

Specify the SSL port to which you connect when attempting to retrieve the signer certificate.

Data type: Text

SSL configuration for outbound connection

Specify the SSL configuration that is used to connect to the previously specified SSL port. This configuration is also the SSL configuration that contains the signer after retrieval. This SSL configuration does not need to have the trusted certificate for the SSL port as it is retrieved during validation and presented here.

Data type: Text
Default: DefaultSSLConfig

Alias

Specify the certificate alias name to reference the signer in the key store, which is specified in the SSL configuration.

Data type: Text

Retrieved signer information

Signer certificate information if it is retrieved from the remote host and port.

Serial number

Specify the certificate serial number that is generated by the issuer of the certificate.

Issued to

Specify the distinguished name of the entity to which the certificate was issued.

Issued by

Specify the distinguished name of the entity that issued the certificate. This name is the same as the issued-to distinguished name when the signer certificate is self-signed.

Fingerprint (SHA Digest)

Specify the Secure Hash Algorithm (SHA hash) of the certificate, which can be used to verify the certificate's hash at another location, such as the client side of a connection.

Expiration

Specify the expiration date of the retrieved signer certificate for validation purposes.




 

Related tasks


Creating a Secure Sockets Layer configuration

 

Related Reference

Key stores and certificates collection
Signer certificates collection

 

Reference topic