Managing the Private Certificate Lifecycle
Table 1 describes operations during the private certificate lifecycle management.
Operation |
Description |
Remarks |
---|---|---|
Applying for a private certificate |
Private certificates are classified into client certificates and server certificates based on the role of an entity in communications. Before applying for a private certificate, ensure that you have created a private CA that can be used to issue certificates. |
|
Exporting a private certificate |
Export a private certificate (including the private key) that has been issued. You can select the certificate format. |
Keep the private keys of private certificates secure. If the private key is disclosed, revoke and replace the private certificate in time.
NOTICE:
If any CA certificate in the certificate chain path is permanently deleted, the private certificate cannot be exported. |
Revoking a private certificate |
You can revoke any private certificate you no longer need for any reason. Revoking private certificates in a timely manner prevents abuse of private certificates. |
Certificate abuse may cause security problems.
NOTICE:
If the parent CA does not enable the CRL configuration, the private certificate revocation status cannot be queried. This means a revoked private certificate can still pass the validation. |
Deleting a private certificate |
You can delete a private certificate anytime. |
You can delete a private certificate in any state.
NOTICE:
This operation will immediately delete all information about the private certificate from the database. This operation is irreversible. Exercise caution when performing this operation. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot