SSL: HOW TO APPLY SIGNED CERTFICATE TO TGP



Similar documents
Deploying Certificates with Cisco pxgrid. Using Self-Signed Certificates with ISE pxgrid node and pxgrid Client

Configuring HTTPS support. Overview. Certificates

SSL Certificate Generation

Exchange Reporter Plus SSL Configuration Guide

Customizing SSL in CA WCC r11.3 This document contains guidelines for customizing SSL access to CA Workload Control Center (CA WCC) r11.3.

Version 9. Generating SSL Certificates for Progeny Web

Creating an authorized SSL certificate

Installing Digital Certificates for Server Authentication SSL on. BEA WebLogic 8.1

SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release [August] [2014]

Setting up Single Sign-on in Service Manager

CHAPTER 7 SSL CONFIGURATION AND TESTING

SSO Plugin. Case study: Integrating with Ping Federate. J System Solutions. Version 4.0

Verify Needed Root Certificates Exist in Java Trust Store for Datawire JavaAPI

Cisco Prime Central Managing Certificates

Configuring SSL in OBIEE 11g

CA Nimsoft Unified Management Portal

Intro to AppDynamics with SSL

PowerChute TM Network Shutdown Security Features & Deployment

DISTRIBUTED CONTENT SSL CONFIGURATION AND TROUBLESHOOTING GUIDE

This document uses the following conventions for items that may need to be modified:

C O N F I G U R I N G O P E N L D A P F O R S S L / T L S C O M M U N I C A T I O N

Luxembourg (Luxembourg): Trusted List

Replacing Default vcenter Server 5.0 and ESXi Certificates

Entrust Certificate Services. Java Code Signing. User Guide. Date of Issue: December Document issue: 2.0

To install and configure SSL support on Tomcat 6, you need to follow these simple steps. For more information, read the rest of this HOW-TO.

User Guide Generate Certificate Signing Request (CSR) & Installation of SSL Certificate

Director and Certificate Authority Issuance

SSL Configuration on WebSphere Oracle FLEXCUBE Universal Banking Release [September] [2013] Part No. E

Enterprise Content Management System Monitor 5.1 Security Considerations Revision CENIT AG Brandner, Marc

Junio SSL WebLogic Oracle. Guía de Instalación. Junio, SSL WebLogic Oracle Guía de Instalación CONFIDENCIAL Página 1 de 19

ADSelfService Plus: Guide to Install SSL Certificate. 1 P a g e

Ciphermail S/MIME Setup Guide

Working with Portecle to update / create a Java Keystore.

Developers Integration Lab (DIL) Certificate Installation Instructions. Version 1.4

VMware vcenter Server 5.5 Deploying a Centralized VMware vcenter Single Sign-On Server with a Network Load Balancer

Public Health Information Network Messaging System

How to Implement Two-Way SSL Authentication in a Web Service

SafeNet KMIP and Amazon S3 Integration Guide

Enable SSL in Go2Group SOAP Server

SolarWinds Technical Reference

Configuring Secure Socket Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Systems That Use Oracle WebLogic 10.

SafeNet KMIP and Google Cloud Storage Integration Guide

1. If there is a temporary SSL certificate in your /ServerRoot/ssl/certs/ directory, move or delete it. 2. Run the following command:

LAB :: Secure HTTP traffic using Secure Sockets Layer (SSL) Certificate

Table of Contents INTRODUCTION... 2 SYSTEM REQUIREMENTS... 3 SERVICEDESK PLUS EDITIONS... 4 INSTALL SERVICEDESK PLUS... 5

Table of Contents INTRODUCTION... 2 SYSTEM REQUIREMENTS... 3 SERVICEDESK PLUS - MSP EDITIONS... 5 INSTALL SERVICEDESK PLUS - MSP...

IUCLID 5 Guidance and Support

Quick and Easy Solutions With Free Java Libraries Part II

Chapter 1: How to Configure Certificate-Based Authentication

Accessing PostgreSQL through JDBC via a Java SSL tunnel

Step- by- Step guide to extend Credential Sync between IBM WebSphere Portal 8.5 credential vault and Active Directory 2012 using Security Directory

SSL With Oracle JDBC Thin Driver

Java Client Side Application Basics: Decompiling, Recompiling and Signing

KMIP installation Guide. DataSecure and KeySecure Version SafeNet, Inc

SAML v1.1 for.net Developer Guide

Installation valid SSL certificate

SERVER CERTIFICATES OF THE VETUMA SERVICE

Installing BIRT Analytics 4.4

Activating HTTPS using wildcard certificate in Horizon Application Manager 1.5

RHEV 2.2: REST API INSTALLATION

SERVER CERTIFICATES OF THE VETUMA SERVICE

Oracle Fusion Applications Splitting Topology from Single to Multiple Host Servers

Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N REV A01 January 14, 2011

HTTPS Configuration for SAP Connector

Wildcard Certificates

ASA 8.x Manually Install 3rd Party Vendor Certificates for use with WebVPN Configuration Example

Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with

Java SSL - sslecho SSL socket communication with client certificate

CS255 Programming Project 2

Marriott Enrollment Server for Web User Guide V1.4

Configuring the JBoss Application Server for Secure Sockets Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Web

Installing Apache as an HTTP Proxy to the local port of the Secure Agent s Process Server

Table of Contents INTRODUCTION... 2 SYSTEM REQUIREMENTS... 3 INSTALLATION... 4 INSTALLING SUPPORTCENTER PLUS In Windows In Linux...

DOCUMENTUM CONTENT SERVER CERTIFICATE BASED SSL CONFIGURATION AND TROUBLESHOOTING

NetApp SANtricity Web Service for E-Series Proxy 1.0

C-Series How to configure SSL

WEB SERVICES CERTIFICATE GUIDE

DOCUMENTUM CONTENT SERVER CERTIFICATE BASED SSL CONFIGURATION WITH CLIENTS

ASA Remote Access VPN with OCSP Verification under Microsoft Windows 2012 and OpenSSL

Security certificate management

Copyright 2013 EMC Corporation. All Rights Reserved.

Installing an SSL Certificate Provided by a Certificate Authority (CA) on the vwlan Appliance

OpenCA v (ten-ten 2 )

How to Create Keystore and Truststore Files for Secure Communication in the Informatica Domain

Universal Content Management Version 10gR3. Security Providers Component Administration Guide

Djigzo S/MIME setup guide


LAB :: Secure HTTP traffic using Secure Sockets Layer (SSL) Certificate

Install an SSL Certificate onto SilverStream. Sender Recipient Attached FIles Pages Date. Development Internal/External None 5 6/16/08

Encrypted Connections

Certificate Policy for. SSL Client & S/MIME Certificates

How to Implement Transport Layer Security in PowerCenter Web Services

Configuring an Oracle Business Intelligence Enterprise Edition Resource in Metadata Manager

Transcription:

SSL: HOW TO APPLY SIGNED CERTFICATE TO TGP Microsoft Windows [Version 5.2.3790 (C) Copyright 1985-2003 Microsoft Corp. C:\Documents and Settings\trevor>cd\ C:\>cd "Program Files" C:\Program Files>cd "Time Guardian Pro"\jre\bi The system cannot find the path specified. C:\Program Files>cd "Time Guardian Pro\jre\bin" Basically: 1. You ll create a new keystore(.jks) 2. Convert it to a CSR(.cer) 3. Email it to the CA i. CA will provide 2 or 3 signed certs(root,inter,domain) 4. Make sure the new keystore you made is in TGP\apache\conf 5. Import the 3 signed certs to the keystore 6. Edit ENDPOINT(s) 7. Restart apache service C:\Program Files\Time Guardian Pro\jre\bin>keytool -list -v -keystore "C:\Progra m Files\Time Guardian Pro\apache-tomcat-5.5.12\conf\amanoKeys.jks" Enter keystore password: Keystore type: JKS Keystore provider: SUN Your keystore contains 3 entries This entire command checks the current status of tomcat s SSL entries Alias name: inter Entry type: trustedcertentry Owner: CN=UTN-USERFirst-Hardware, OU=http://www.usertrust.com, O=The USERTRUST N etwork, L=Salt Lake City, ST=UT, C=US Issuer: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTru st AB, C=SE Serial number: 5242064a4f37fe4369487a9667ff5d27 Valid from: Tue Jun 07 02:09:10 MDT 2005 until: Sat May 30 04:48:38 MDT 2020 Certificate fingerprints: MD5: 1C:BC:22:07:4D:3A:3A:BB:9D:A4:71:D5:F6:6D:AD:45 SHA1: 86:75:39:A2:6C:81:FA:2D:78:27:7C:3A:DF:DB:30:43:12:53:5E:57 #1: ObjectId: 2.5.29.15 Criticality=true #2: ObjectId: 2.5.29.19 Criticality=true Subject 0000: A1 72 5F 26 1B 28 98 43 95 5D 07 37 D5 85 96 9D.r_&.(.C..7... 0010: 4B D2 C3 45 K..E #4: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: http://crl.comodoca.com/addtrustexternalcaroot.crl, DistributionPoint: http://crl.comodo.net/addtrustexternalcaroot.crl #5: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.5.29.32.0

[ #6: ObjectId: 2.5.29.35 Criticality=false Authority 0000: AD BD 98 7A 34 B4 26 F7 FA C4 26 54 EF 03 BD E0...z4.&...&T... Alias name: root Entry type: trustedcertentry Owner: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrus t AB, C=SE Issuer: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTru st AB, C=SE Serial number: 1 Valid from: Tue May 30 04:48:38 MDT 2000 until: Sat May 30 04:48:38 MDT 2020 Certificate fingerprints: MD5: 1D:35:54:04:85:78:B0:3F:42:42:4D:BF:20:73:0A:3F SHA1: 02:FA:F3:E2:91:43:54:68:60:78:57:69:4D:F5:E4:5B:68:85:18:68 #1: ObjectId: 2.5.29.19 Criticality=true #2: ObjectId: 2.5.29.15 Criticality=false Subject 0000: AD BD 98 7A 34 B4 26 F7 FA C4 26 54 EF 03 BD E0...z4.&...&T... #4: ObjectId: 2.5.29.35 Criticality=false Authority 0000: AD BD 98 7A 34 B4 26 F7 FA C4 26 54 EF 03 BD E0...z4.&...&T... [CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE SerialNumber: [ 01

Alias name: tomcat Entry type: trustedcertentry Owner: CN=www.petlandtimeserver.ca, OU=Comodo InstantSSL, O=Petland, L=Calgary, ST=Alberta, C=CA Issuer: CN=UTN-USERFirst-Hardware, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US Serial number: e5e4a34bc7f1ae41a0512e7a6c7fadc9 Valid from: Thu Feb 05 17:00:00 MST 2009 until: Thu Feb 06 16:59:59 MST 2014 Certificate fingerprints: MD5: C3:4F:4C:3E:A3:B4:94:58:5D:C0:71:0A:5F:F5:60:7C SHA1: 0F:E7:0E:25:84:B9:CF:D6:2C:EB:E3:8B:AB:F9:32:6A:62:2A:6E:EA #1: ObjectId: 2.5.29.15 Criticality=true DigitalSignature Key_Encipherment #2: ObjectId: 2.5.29.19 Criticality=true CA:false PathLen: undefined Subject 0000: 3A D1 68 8C B0 FD C4 24 65 98 71 01 8A 14 2E 9F :.h...$e.q... 0010: EE C3 6E BC..n. #4: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [accessmethod: 1.3.6.1.5.5.7.48.2 accesslocation: URIName: http://crt.comodoca.com/utnaddtrustserverca.crt, acc essmethod: 1.3.6.1.5.5.7.48.1 accesslocation: URIName: http://ocsp.comodoca.com #5: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: http://crl.comodoca.com/utn-userfirst-hardware.crl, DistributionPoint: http://crl.comodo.net/utn-userfirst-hardware.crl #6: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [1.3.6.1.4.1.6449.1.2.1.3.4 [PolicyQualifierInfo: [ qualifierid: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 1D 68 74 74 70 73 3A 2F 2F 73 65 63 75 72 65..https:// secure 0010: 2E 63 6F 6D 6F 64 6F 2E 6E 65 74 2F 43 50 53.comodo.net/CPS This is wrong

#7: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverauth clientauth #8: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL client SSL server #9: ObjectId: 2.5.29.35 Criticality=false Authority 0000: A1 72 5F 26 1B 28 98 43 95 5D 07 37 D5 85 96 9D.r_&.(.C..7... 0010: 4B D2 C3 45 K..E S T E P 1 #10: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ DNSName: www.petlandtimeserver.ca DNSName: petlandtimeserver.ca Rename the amanokeys.jks (keystore) from the apache\conf dir before you proceed with the below commands Any keytool commands must be executed in a single line, note the keypass/storepass which will be your password later C:\Program Files\Time Guardian Pro\jre\bin>keytool -genkey -keyalg RSA -keystore "e:\amanokeys.jks" -validity 1825 -alias tomcat -keypass amano123 -storepass amano123 What is your first and last name? [Unknown: www.petlandtimeserver.ca What is the name of your organizational unit? [Unknown: Petland What is the Not name of your important organization? [Unknown: What is the name of your City Locality? [Unknown: What is the name of your State or Province? [Unknown: What is the two-letter country code for this unit? [Unknown: CA Is CN=www.petlandtimeserver.ca, OU=Petland, O=Unknown, L=Unknown, ST=Unknown, C= CA correct? [no: yes S T E P 2 & 3 C:\Program Files\Time Guardian Pro\jre\bin>keytool -certreq -alias tomcat -file e:\amano.cer -keystore "e:\amanokeys.jks" -storepass amano123 Email the file to the certificate authority (i.e. verisign, comodo, etc.) This is the CSR.

S T E P 4 & 5 When you receive the 2 or 3 signed files from the CA, copy them to where keytool.exe (TGP\jre\bin) is. Also move the new jks file that you previously made to the TGP\apache\conf folder. C:\Program Files\Time Guardian Pro\jre\bin>keytool -import -trustcacerts -alias root -file AddTrustExternalCARoot.crt -keystore "C:\Program Files\Time Guardian Pro\apache-tomcat-5.5.12\conf\amanoKeys.jks" Enter keystore password: Certificate already exists in system-wide CA keystore enter your under keypass/storepass alias <addtrustexter here nalca> Do you still want to add it to your own keystore? [no: yes Certificate was added to keystore C:\Program Files\Time Guardian Pro\jre\bin>keytool -import -trustcacerts -alias INTER -file "UTNAddTrustServerCA.crt -keystore "C:\Program Files\Time Guardian P ro\apache-tomcat-5.5.12\conf\amanokeys.jks" keytool error: java.lang.runtimeexception: Usage error, Files\Time is not a lega l command C:\Program Files\Time Guardian Pro\jre\bin>keytool -import -trustcacerts -alias INTER -file UTNAddTrustServerCA.crt -keystore "C:\Program Files\Time Guardian Pr o\apache-tomcat-5.5.12\conf\amanokeys.jks" Enter keystore password: Certificate was added to keystore C:\Program Files\Time Guardian Pro\jre\bin>keytool -import -trustcacerts -alias tomcat -file www_petlandtimeserver_ca.crt -keystore "C:\Program Files\Time Guard ian Pro\apache-tomcat-5.5.12\conf\amanoKeys.jks" Enter keystore password: Certificate reply was installed in keystore C:\Program Files\Time Guardian Pro\jre\bin>keytool -list -v -keystore "C:\Progra m Files\Time Guardian Pro\apache-tomcat-5.5.12\conf\amanoKeys.jks" >newlist.txt Enter keystore password: amano123 C:\Program Files\Time Guardian Pro\jre\bin> S T E P 6 C:\Program Files\Time Guardian Pro\apache-tomcat-5.5.12\webapps\tgpro\WEB- INF\classes\TGProResources.properties the above file must be set to non-ssl with localhost on all ENDPOINTs: CALCENGINE_WS_ENDPOINT=http://localhost:8080/axis/services/tgpro/CalcEngineService CALCENGINE_WS_CONSUMER_ID=tgpro CALCENGINE_WS_CONSUMER_PASSWORD=a,&^^684849ydyh38fjh28rj3849 # IM web service - TODO: Change for IM IM_WS_ENDPOINT=http://localhost:8080/axis/services/tgpro/IMService IM_WS_CONSUMER_ID=tgpro IM_WS_CONSUMER_PASSWORD=a,&^^684849ydyh38fjh28rj3849 # report web service consumer REPORT_WS_ENDPOINT=http://localhost:8080/axis/services/tgpro/ReportService REPORT_WS_CONSUMER_ID=tgpro REPORT_WS_CONSUMER_PASSWORD=a,&^^684849ydyh38fjh28rj3849 # schedule web service consumer SCHEDULE_WS_ENDPOINT=http://localhost:8080/axis/services/tgpro/RotationService S T E P 7 Restart the apache tomcat service After running, keytool -list -v -keystore "C:\Program Files\Time Guardian Pro\apachetomcat-5.5.12\conf\amanoKeys.jks" again Keystore type: JKS

Keystore provider: SUN Your keystore contains 3 entries Alias name: inter Entry type: trustedcertentry Owner: CN=UTN-USERFirst-Hardware, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US Issuer: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE Serial number: 5242064a4f37fe4369487a9667ff5d27 Valid from: Tue Jun 07 02:09:10 MDT 2005 until: Sat May 30 04:48:38 MDT 2020 Certificate fingerprints: MD5: 1C:BC:22:07:4D:3A:3A:BB:9D:A4:71:D5:F6:6D:AD:45 SHA1: 86:75:39:A2:6C:81:FA:2D:78:27:7C:3A:DF:DB:30:43:12:53:5E:57 #1: ObjectId: 2.5.29.15 Criticality=true #2: ObjectId: 2.5.29.19 Criticality=true Subject 0000: A1 72 5F 26 1B 28 98 43 95 5D 07 37 D5 85 96 9D.r_&.(.C..7... 0010: 4B D2 C3 45 K..E #4: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: http://crl.comodoca.com/addtrustexternalcaroot.crl, DistributionPoint: http://crl.comodo.net/addtrustexternalcaroot.crl #5: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.5.29.32.0 [ #6: ObjectId: 2.5.29.35 Criticality=false

Authority 0000: AD BD 98 7A 34 B4 26 F7 FA C4 26 54 EF 03 BD E0...z4.&...&T... Alias name: root Entry type: trustedcertentry Owner: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE Issuer: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE Serial number: 1 Valid from: Tue May 30 04:48:38 MDT 2000 until: Sat May 30 04:48:38 MDT 2020 Certificate fingerprints: MD5: 1D:35:54:04:85:78:B0:3F:42:42:4D:BF:20:73:0A:3F SHA1: 02:FA:F3:E2:91:43:54:68:60:78:57:69:4D:F5:E4:5B:68:85:18:68 #1: ObjectId: 2.5.29.19 Criticality=true #2: ObjectId: 2.5.29.15 Criticality=false Subject 0000: AD BD 98 7A 34 B4 26 F7 FA C4 26 54 EF 03 BD E0...z4.&...&T... #4: ObjectId: 2.5.29.35 Criticality=false Authority 0000: AD BD 98 7A 34 B4 26 F7 FA C4 26 54 EF 03 BD E0...z4.&...&T...

[CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE SerialNumber: [ 01 Alias name: tomcat Entry type: PrivateKeyEntry Certificate chain length: 3 This is correct Certificate[1: Owner: CN=www.petlandtimeserver.ca, OU=Comodo InstantSSL, O=Petland, L=Calgary, ST=Alberta, C=CA Issuer: CN=UTN-USERFirst-Hardware, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US Serial number: 1d99c44e647d63bb4a90c83b66fbadb5 Valid from: Thu Feb 05 17:00:00 MST 2009 until: Thu Feb 06 16:59:59 MST 2014 Certificate fingerprints: MD5: C4:AA:71:0E:A7:CC:D8:70:A6:33:C1:99:E3:CD:02:2C SHA1: 08:22:4B:1C:6D:22:14:63:99:33:EF:CF:69:66:FC:94:A3:C1:34:61 #1: ObjectId: 2.5.29.15 Criticality=true DigitalSignature Key_Encipherment #2: ObjectId: 2.5.29.19 Criticality=true CA:false PathLen: undefined Subject 0000: 8D B6 76 2E BF 23 EB D2 5B 3D CE F7 B4 AD 58 BD..v..#..[=...X. 0010: 9A F8 1C 40...@ #4: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [accessmethod: 1.3.6.1.5.5.7.48.2 accesslocation: URIName: http://crt.comodoca.com/utnaddtrustserverca.crt, accessmethod: 1.3.6.1.5.5.7.48.1 accesslocation: URIName: http://ocsp.comodoca.com #5: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: http://crl.comodoca.com/utn-userfirst-hardware.crl, DistributionPoint: http://crl.comodo.net/utn-userfirst-hardware.crl #6: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [

[CertificatePolicyId: [1.3.6.1.4.1.6449.1.2.1.3.4 [PolicyQualifierInfo: [ qualifierid: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 1D 68 74 74 70 73 3A 2F 2F 73 65 63 75 72 65..https://secure 0010: 2E 63 6F 6D 6F 64 6F 2E 6E 65 74 2F 43 50 53.comodo.net/CPS #7: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverauth clientauth #8: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL client SSL server #9: ObjectId: 2.5.29.35 Criticality=false Authority 0000: A1 72 5F 26 1B 28 98 43 95 5D 07 37 D5 85 96 9D.r_&.(.C..7... 0010: 4B D2 C3 45 K..E #10: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ DNSName: www.petlandtimeserver.ca DNSName: petlandtimeserver.ca Certificate[2: Owner: CN=UTN-USERFirst-Hardware, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US Issuer: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE Serial number: 5242064a4f37fe4369487a9667ff5d27 Valid from: Tue Jun 07 02:09:10 MDT 2005 until: Sat May 30 04:48:38 MDT 2020 Certificate fingerprints: MD5: 1C:BC:22:07:4D:3A:3A:BB:9D:A4:71:D5:F6:6D:AD:45 SHA1: 86:75:39:A2:6C:81:FA:2D:78:27:7C:3A:DF:DB:30:43:12:53:5E:57 #1: ObjectId: 2.5.29.15 Criticality=true #2: ObjectId: 2.5.29.19 Criticality=true Subject 0000: A1 72 5F 26 1B 28 98 43 95 5D 07 37 D5 85 96 9D.r_&.(.C..7... 0010: 4B D2 C3 45 K..E #4: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [

[DistributionPoint: http://crl.comodoca.com/addtrustexternalcaroot.crl, DistributionPoint: http://crl.comodo.net/addtrustexternalcaroot.crl #5: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.5.29.32.0 [ #6: ObjectId: 2.5.29.35 Criticality=false Authority 0000: AD BD 98 7A 34 B4 26 F7 FA C4 26 54 EF 03 BD E0...z4.&...&T... Certificate[3: Owner: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE Issuer: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE Serial number: 1 Valid from: Tue May 30 04:48:38 MDT 2000 until: Sat May 30 04:48:38 MDT 2020 Certificate fingerprints: MD5: 1D:35:54:04:85:78:B0:3F:42:42:4D:BF:20:73:0A:3F SHA1: 02:FA:F3:E2:91:43:54:68:60:78:57:69:4D:F5:E4:5B:68:85:18:68 #1: ObjectId: 2.5.29.19 Criticality=true #2: ObjectId: 2.5.29.15 Criticality=false Subject 0000: AD BD 98 7A 34 B4 26 F7 FA C4 26 54 EF 03 BD E0...z4.&...&T... #4: ObjectId: 2.5.29.35 Criticality=false Authority 0000: AD BD 98 7A 34 B4 26 F7 FA C4 26 54 EF 03 BD E0...z4.&...&T... [CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE SerialNumber: [ 01