<< < 1 2 3 4 5 6 > >>   Sort: Rank

Learn More About Certificate Stores
Windows stores a certificate locally on the computer or device that requested it or, in the case of a user, on the computer or device that the user used to request it. The storage location is called the certificate store. A certificate store often has numerous certificates, possibly issued from a nu...
2016-07-27, 352👍, 0💬

View Certificate Information
Double-click a certificate to view its properties and intended uses. This information is displayed on three tabs: General, Details, and Certification Path. General TabDetails TabCertification Path Tab ⇒⇒Certificate Manager "certmgr.msc" Manual
2016-07-27, 349👍, 0💬

Certificate Validity Periods
The Certificates snap-in enables you to renew a certificate issued from a Windows-based enterprise certification authority (CA) before or after the end of its validity period by using the Certificate Renewal Wizard. About certificate validity Every certificate has a validity period. After the end of...
2016-07-25, 372👍, 0💬

View Certificate Properties
The Certificate Properties dialog box displays certificate property values on four tabs. Certificate Properties General Tab Certificate Properties Cross-Certificates Tab Certificate Properties OCSP Tab Certificate Properties Extended Validation Tab ⇒⇒Certificate Manager "certmgr.msc" Manual
2016-07-25, 361👍, 0💬

Details Tab
The Details tab provides the following information about the certificate: Version. The X.509 version number. Serial number. The unique serial number that the issuing certification authority (CA) assigns to the certificate. The serial number is unique for all certificates issued by a given CA. Signat...
2016-07-25, 348👍, 0💬

Hash Algorithms
A hash algorithm is an algorithm that produces a hash value of a piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can alter every bit in the resulting hash value. For this reason, hashes are useful in detecting any modification in a data object, ...
2016-07-25, 344👍, 0💬

Certification Path Tab
Using the Certification Path tab, you can view the path from the selected certificate to the certification authorities (CAs) that issue the certificate. Before a certificate is trusted, Windows must verify that the certificate comes from a trusted source. This verification process is called path val...
2016-07-25, 334👍, 0💬

Certificate Properties OCSP Tab
The OCSP tab is used by administrators to add Online Certificate Status Protocol (OCSP) responder URLs to issuing certification authority (CA) certificates, which are distributed by Group Policy to Active Directory domain members. This enables organizations to add OCSP responders to an existing publ...
2016-07-22, 618👍, 0💬

Certificate Properties Cross-Certificates Tab
Cross-certificates are used to establish trust between separate certification hierarchies, such as in separate networks or portions of a network. In these cases, cross-certificates are typically configured to: Define the namespaces for which certificates issued in one certification hierarchy can be ...
2016-07-22, 426👍, 0💬

Certificate Properties General Tab
The General tab can be used to provide a display name and description that can be used to differentiate between two certificates that are similar, such as two unique signing certificates. You can also use the General tab to enable or disable specific purposes or uses for the certificate. ✍ Note You ...
2016-07-22, 364👍, 0💬

Certificate Properties Extended Validation Tab
The Extended Validation tab is used by administrators to add an Extended Validation (EV) certificate policy to root certificates that are distributed by Group Policy. Adding the EV certificate policy to root certificates and certificates issued to intranet Web sites provides a visual indicator that ...
2016-07-22, 361👍, 0💬

View the Certificates in a PKCS #7 file
If multiple certificates are exported and saved as PKCS #7 files, or if some time has passed since the file was created, it may not be obvious what certificates a PKCS #7 file contains. The following procedure allows you to inspect the certificates contained in a PKCS #7 file. Users or local Admini...
2016-07-22, 357👍, 0💬

Delete a Certificate
Certificates can become obsolete for a number of reasons, such as when they are compromised, become corrupted, or are replaced by a new certificate. However, even when a certificate is deleted, the corresponding private key is not deleted. ! Important Before deleting a certificate, be sure that you ...
2016-07-21, 451👍, 0💬

Find Certificates
The Find Certificates dialog box allows you to locate certificates based on criteria that you specify. Users or local Administrators is the minimum group membership required to complete this procedure. Review the details in "Additional considerations" in this topic. ☞ To find a certificate In the co...
2016-07-21, 443👍, 0💬

Modify the Properties of a Certificate
You can modify the properties of a certificate for a number of reasons: Adding or modifying a display name to help differentiate it from other similar certificates. Changing the purpose of the certificate by adding or disabling purposes. Specifying cross-certificate download locations. Users or loca...
2016-07-21, 404👍, 0💬

Display Archived Certificates
Archived certificates are certificates that have expired or have been renewed. In many cases, it is good practice to retain archived certificates instead of deleting them. For example, you might keep an archived certificate to verify digital signatures on old documents that were signed by using the ...
2016-07-21, 404👍, 0💬

View Certificate Revocation List Details
Certificate revocation lists (CRLs) are used to distribute information about revoked certificates to individuals, computers, and applications attempting to verify the validity of certificates. The Revocation List tab lists the serial numbers of certificates that have been revoked and the date they w...
2016-07-21, 350👍, 0💬

Move Certificates
Many applications look for a certificate in only one certificate store. If a certificate is not in the certificate store that you need, you can move it from one store to another. Users or local Administrators is the minimum group membership required to complete this procedure. Review the details in ...
2016-07-20, 395👍, 0💬

Export a Certificate with the Private Key
In some cases, you may want to export a certificate with its private key to store on removable media or to use on a different computer. There are some restrictions to this procedure: A private key is exportable only when it is specified in the certificate request or certificate template that was use...
2016-07-20, 384👍, 0💬

Export a Certificate
You can export a certificate in order to import a copy on a different computer or device or to store a copy in a secure location. If you are exporting certificates for import onto a computer running Windows, PKCS #7 format is the preferred export format. This format preserves the chain of certificat...
2016-07-20, 376👍, 0💬

Import a Certificate
You should only import certificates obtained from trusted sources. Importing an unreliable certificate could compromise the security of any system component that uses the imported certificate. You can import a certificate into any logical or physical store. In most cases, you will import certificate...
2016-07-20, 361👍, 0💬

Automate Certificate Management
Managing certificates individually can be a laborious, if not impossible, task. Many organizations will manage certificates by using Group Policy settings configured on a server and applied to client computers in a domain, group, or organizational unit. The following options can be viewed on a clien...
2016-07-20, 354👍, 0💬

Root CA Certificates Provided on Windows in 2016
Where I can get a list of all root CA certificates provided by Microsoft on Windows? Here is a complete list of trusted root CA certificate provided by Microsoft on Windows system in 2016: Root CA Certificate - Expiration Date AAA Certificate Services - 12/31/2028 AC Raíz Certicámara S.A. - 4/2/2030...
2016-07-19, 1403👍, 0💬

Manage Trusted Root Certificates
Because of the growing variety of certificates in use today and the growing number of certificate issues, some organizations may want to manage certificate trust and prevent users in the domain from configuring their own set of trusted root certificates. In addition, some organizations may want to i...
2016-07-17, 578👍, 0💬

<< < 1 2 3 4 5 6 > >>   Sort: Rank