Have keyUsage and extendedkeyusage set for user/server certficates as is befitting each role
git-svn-id: https://svn.code.sf.net/p/xcat/code/xcat-core/trunk@14876 8638fb3e-16cb-4fca-ae20-7b5d299a9bcd
This commit is contained in:
parent
92508cf564
commit
f740315ef2
@ -162,6 +162,8 @@ nsCertType = server, client, objsign
|
||||
nsComment = "OpenSSL Generated Server Certificate"
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid,issuer
|
||||
keyUsage = digiatalSignature,KeyAgreement
|
||||
extendedKeyUsage = serverAuth
|
||||
|
||||
[ usr_cert ]
|
||||
|
||||
@ -171,6 +173,8 @@ authorityKeyIdentifier=keyid,issuer
|
||||
# requires this to avoid interpreting an end user certificate as a CA.
|
||||
|
||||
basicConstraints=CA:FALSE
|
||||
keyUsage = digiatalSignature,KeyAgreement
|
||||
extendedKeyUsage = clientAuth
|
||||
|
||||
# Here are some examples of the usage of nsCertType. If it is omitted
|
||||
# the certificate can be used for anything *except* object signing.
|
||||
|
Loading…
x
Reference in New Issue
Block a user