Using End User Services
2
2.4. Checking on Your Request Status ............................................................................... 15
2.5. Retrieving Your Certificates ......................................................................................... 16
2.6. Listing and Searching for Certificates .......................................................................... 18
2.7. Renewing Certificates ................................................................................................. 23
2.8. Revoking Certificates .................................................................................................. 27
2.9. Downloading CA Certificates and Certificate Chains ..................................................... 31
3. Getting and Managing Certificates through RA Services .......................................................... 32
3.1. Opening the RA Services Page ................................................................................... 32
3.2. Requesting Certificates ............................................................................................... 33
3.3. Checking on Your Request Status ............................................................................... 41
3.4. Retrieving and Importing Certificates ........................................................................... 42
3.5. Renewing User Certificates ......................................................................................... 44
4. Additional Reading ................................................................................................................ 46
5. Giving Feedback ................................................................................................................... 47
6. Revision History .................................................................................................................... 48
1. A Look at End User Services in Red Hat Certificate
System
Red Hat Certificate System provides a simple way for people to obtain certificates that they need to
protect common Internet-based actions, like sending email, logging into a computer, or accessing
a protected website. Any user can access Certificate System's web-based certificate management
interface to request or receive a certificate.
1.1. About Certificates and Cryptography
Red Hat Certificate System provides a way for a company or group to create and manage certificates
locally.
A certificate is a file which proves the identity of a person, server, router, website, or other entity.
Certificates can also be used to encrypt and decrypt information; this is a vital function which protects
sensitive communication — from online shopping to email — by safely encoding the traffic using
mathematical algorithms to create a cipher.
A certificate is part of an overall strategy for secure (encrypted) communication. Some web protocols
such as Secure Sockets Layer (SSL) and Transport Layer Security (TLS) use encryption to secure
Internet communications, as do VPNs, some intranets, email, and web browsers.
Secure communications are built around an SSL handshake. An SSL handshake is when a server
reaches out to a client (user) with some proof of its identity, such as a certificate; this is server
authentication. The client can then accept that certificate to continue with the connection. The server
may require some proof back from the user to verify his identity; this is client authentication. After the
server and client are shown to be authentic, then they can continue with their transactions.
The transactions are encoded using agreed upon methods, called ciphers. The cipher is used
in conjunction with a special number, called a key, to encrypt and decrypt the data being sent. A
certificate, along with identifying the user and the authority which issued it, defines what kind of
ciphers it supports and the public key for encrypting information.
There are a number of different ways that the information can be encrypted for safe sending and then
decrypted for safe reading: asymmetric keys, symmetric keys, and shared keys. A key, in broad terms,
is combined with a mathematical algorithm to scramble data; if someone knows the matching key, then
they can use it to unscramble the data. A key, then, locks and unlocks data. A public key is known to