01-17-2012
question about certificate for domain
Hi,
I would like to know if certificate for mydomain.com would work as well for
www.mydomain.com and for all subdomain of example.com?
I ask this because I want to buy a certificate and I was not what domain should I ask the certificate for?
Last edited by programAngel; 01-17-2012 at 08:32 AM..
10 More Discussions You Might Find Interesting
1. Forum Support Area for Unregistered Users & Account Problems
TO WHOM IT MAY CONCERN:
I am Ayanda Fuzile, I would like to request my UNIX Certificate, I completed my course in 2000. My email adress is removed, my postal adress is also removed.
Kind Regards,
Ayanda Fuzile (1 Reply)
Discussion started by: afuzile
1 Replies
2. HP-UX
Hi,
we are having the installed cerificates in our unix server's.
The certificates are in following format : cacert.pem,cert8.db,ois294.sem,CertGenCAKey.der,ss_keystore.jks
So i want to know the Expiry date for these certificates. how to get the valid FROM to TO dates for these kind of... (1 Reply)
Discussion started by: srujana
1 Replies
3. Windows & DOS: Issues & Discussions
Dear Expert,
i have linux box that is running in the windows domain, BUT did not being a member of the domain. as I am not the System Administrator so I have no control on the server in the network, such as modify dns entry , add the linux box in AD and domain record and so on that relevant.
... (2 Replies)
Discussion started by: regmaster
2 Replies
4. Web Development
Dear All
Anyone know how to issue two different certification on apache virtualhost fyi i have one virtualhost eg 69.192.1.25:443 already signed with verisign how can i configure another virtualhost 69.192.1.25:443 which signing with another certificate which self signing. i search net not... (1 Reply)
Discussion started by: netxus
1 Replies
5. Cybersecurity
Hi guys.
I have some questions about ssl certificates.
I looked at SSL providers and saw that they are providing 2 types of certificates: per server or per domain.
my server host name is: srv1.example.com
I have a smtp, imap, web server on this box. but all services accessed by different... (1 Reply)
Discussion started by: majid.merkava
1 Replies
6. Shell Programming and Scripting
Hi,
I am getting below error when I do
-------------------------------
curl: (60) SSL certificate problem, verify that the CA cert is OK. Details:
error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
More details here: cURL - Details on Server SSL Certificates... (5 Replies)
Discussion started by: Anjan1
5 Replies
7. Cybersecurity
Hey everyone, I'm trying to get a lay of the land for OS and Application Certificate Stores. Can someone confirm that I have this concept right?
If the application you're using say Firefox has it's own trusted CA store, it uses that exclusively. So if you're running firefox in Windows, Firefox... (4 Replies)
Discussion started by: Lost in Cyberia
4 Replies
8. Cybersecurity
Hey everyone, another question on certificate chains...
When a site applies for an ssl certificate, do they have to apply to a root CA? or can they apply to a root, or one of the many smaller CA companies? Then once they obtain a cert from that smaller CA, the company gets it's cert signed by a... (1 Reply)
Discussion started by: Lost in Cyberia
1 Replies
9. UNIX for Advanced & Expert Users
:rolleyes:I am trying to setup all certificate based client-server environment in Linux using vsftpd and curl with openssl.
I would like to make a user access with vsftpd certificate and user own client certificate (self-signed) with private/public key.
I don't see google posts about the my plan... (4 Replies)
Discussion started by: gogogo
4 Replies
10. Shell Programming and Scripting
I can view the openSSL certifcate with this command
openssl x509 -text -in myCertificate.pem
I just wanted to see when the cert will expire only. The line which I want to read is,
Not After : Jul 28 14:09:57 2015 GMT
I tried using the grep command but it doesn't display anything.
grep... (1 Reply)
Discussion started by: Loc
1 Replies
LEARN ABOUT CENTOS
efikeygen
EFIKEYGEN(1) General Commands Manual EFIKEYGEN(1)
NAME
efikeygen - command line tool for generating keys to use for PE image signing
SYNOPSIS
efikeygen <[--ca | -C] [--self-sign | -S] | [--signer=nickname]>
[--token=token | -t token]
[--nickname=nickname | -n nickname]
[--common-name=common name | -c common name]
[--url=url | -u url]
[--serial=serial | -s serial]
DESCRIPTION
efikeygen is a command line tool for generating keys and certificates to be used with pesign. These are standard X.509 certificates, and
can potentially be generated with any certificate creation tool. efikeygen simply sets generates keys with sensible options set for a key
to be used for PE image signing.
OPTIONS
--ca The certificate being generated is for a CA.
--self-sign
The generated certificate is to be self signed.
--signer=nickname
Nickname of certificate to be used to sign the generated certificate.
--token=token
Use the specified NSS token's certificate database.
--nickname=nickname
The nickname to use for the generated certificate.
--common-name=common-name
The X.509 Common Name for the generated certificate. This should be in rfc2253 syntax, i.e. "CN=John Doe,OU=editing,O=New York
Times,L=New York,ST=NY,C=US"
--url=url
Informational url regarding objects signed with this key.
--serial=serial number
Serial number for use with this key. A certificate is identified by its signer and its serial number, so it's best not to ever re-
use this value with the same signer.
SEE ALSO
pesign(1)
AUTHORS
Peter Jones
Mon Jan 07 2013 EFIKEYGEN(1)