I've been tasked with setting up an internal timestamping service as part of a major new document management process. This is a steep learning curve for me and I've been setting up various openssl environments for testing of stamping and certificates. I've ended up with the following process chain which I hope someone will be kind enough to give the once over:
1. Create Trusted Root Certificate 2. Create separate public self signed certificates for each department within the business 3. For each document, create a TSQ query file using the appropriate signer certificate for the relevant department. 4. Create a TSR file based on the above TSQ file 5. Lodge the document, the TSR file and the department self signed cert in an appropriate secure area. >From my understanding and testing I can then 'verify' at any time in the future the document timestamp and the validity of the certificate based on the department that the document came from. Does that all look correct ? Thanks Jon -- View this message in context: http://old.nabble.com/OpenSSL-TimeStamping-tp34461353p34461353.html Sent from the OpenSSL - User mailing list archive at Nabble.com. ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [email protected] Automated List Manager [email protected]
