Robert Relyea wrote:
> On 01/07/2011 09:25 AM, Anders Rundgren wrote:
>> Slightly off-topic but I guess some of you guys have more insight in
>> HSMs than most other people have :-)
>>
>> In a recent project there were a requirement for frequent and *automated*
>> renewals of certificates. The ren
maybe use a central ca creating the keys and storing
them (and the cert) on the cards? that way the key
would be created by the hsm of the ca.
of course you would need a card with secured and
authenticated connection to it, so you can be sure
to store key&cert on the card of your choice.
opensc u
On 01/07/2011 09:25 AM, Anders Rundgren wrote:
> Slightly off-topic but I guess some of you guys have more insight in
> HSMs than most other people have :-)
>
> In a recent project there were a requirement for frequent and *automated*
> renewals of certificates. The renewal procedure is based on c
Anders Rundgren wrote:
> In a recent project there were a requirement for frequent and *automated*
> renewals of certificates. The renewal procedure is based on creating
> a self-signed request which is then signed by the original key.
>
> It appears that the new key cannot (for a *remote* CA) be
On Jan 7, 2011, at 7:25 PM, Anders Rundgren wrote:
> Slightly off-topic but I guess some of you guys have more insight in
> HSMs than most other people have :-)
>
> In a recent project there were a requirement for frequent and *automated*
> renewals of certificates. The renewal procedure is bas
Slightly off-topic but I guess some of you guys have more insight in
HSMs than most other people have :-)
In a recent project there were a requirement for frequent and *automated*
renewals of certificates. The renewal procedure is based on creating
a self-signed request which is then signed by th