Hello, 

I posted the message below last Friday, and I haven't seen
any response, not even a curt directive to RTFM (which I
have).  Perhaps I'm not asking in the right way, or perhaps
I'm not asking the right people.

If any of you could explicitly  tell me how to sign a 
certificate request from a browser, while adding my 
own subject distinguished name, I'd appreciate that
very much.  Or perhaps you can tell me where I can find 
out, or give me a pointer to a perl script which does 
so?

  -- Christopher

============================================================

Hi all,

I've been researching the literature for about a week now,
and I've got a very good handle on what needs to happen
at the browser with respect to generating a certificate 
request and installing the signed certificate, but I can't 
figure out what I need to do to receive the certificate 
request from a client and sign it with my CA within a CGI
script.

1) In what form would the certificate request arrive from 
   the browser?

2) How do I sign it while adding a Subject DN based on how 
   they log in like Thawte does?

3) Is there a way of getting the signed cert to be written 
   to STDOUT instead of a file so I can handle the cert 
   directly without having to open a file?

4) I've seen indications that the signed cert can be 
   combined with the CA cert in one download, so that the 
   CA can be a trusted CA.  How does one do this?

TIA for your help.

  --Christopher
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to