I am configuring Apache to use client certificate authentication. When I brows to the site however, it does not ask me for a certificate, unless SSLCACertificateFile is specified. It will then ask for a certificate through the browser. The browser will pop up a box asking me to choose a certificate (it only shows certificates signed by the CA specified by SSLCACertificateFile).
I have an SSL certificate that is self-signed, and therefore uses an intermediate certificate. I am using Node.js and returning both the certificate as well as the certificate chain which includes the intermediate certificate.
It appears that for some people, this works fine but for others it throws an invalid certificate error.
I'm currently using a self signed certificate for in-house development purposes and want to make sure I am aware of any real security risks.
Here's how I set things up.
Created a Root CA .pvk and .cert
Installed the CA root .cert on my local machine under "Trusted Root Certification Authorities"
Installed the CA root .cert on my development hosting server under "Trusted Root C
I use a fedora box at work and have noticed that they use DPI on traffic to the internet. This includes re-signing all https communications with a certificate from our corporate AD domain. This makes using yum, git, curl, or anything depending on openssl difficult. How do I import the corporate AD root CA into my fedora 19 install?
RapidSSLis a trustworthy certificate authority dealing with online security certificates. The main functioning part of such authority covers small and medium enterprises. It provides an inviolable online security with 256-bit encryption.