Displaying 5 results from an estimated 5 matches for "trustid".
Did you mean:
trusted
2016 Jun 15
3
https and self signed
On Jun 15, 2016, at 9:02 AM, Valeri Galtsev <galtsev at kicp.uchicago.edu> wrote:
>
> I do see WoSign there (though I'd prefer to avoid my US located servers
> have certificates signed by authority located in China, hence located sort
> of behind "the great firewall of China" - call me superstitious).
That?s a perfectly valid concern. The last I heard, modern
2017 Nov 24
1
SSL configuration
...x10001)
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Digital Signature, Certificate Sign, CRL Sign
Authority Information Access:
OCSP - URI:http://isrg.trustid.ocsp.identrust.com
CA Issuers - URI:http://apps.identrust.com/roots/dstrootcax3.p7c
X509v3 Authority Key Identifier:
keyid:C4:A7:B1:A4:7B:2C:71:FA:DB:E1:4B:90:75:FF:C4:15:60:85:89:10
X509v3 Certificate Policies:
Policy: 2.2...
2016 Jun 15
0
https and self signed
...rypt.org between Authorities
>> certificates.
>
> That?s because they are not top-tier CAs.
I forgot to mention that letsencrypt.com uses one of its own certificates. You can use your browser?s certificate detail view to see the chain of trust. I see two levels here: IdenTrust -> TrustID -> Let?s Encrypt.
As for starttls.com, that doesn?t exist; you?re probably confusing it with the SMTP STARTTLS protocol extension. What you mean is startssl.com, which is the main public face of StartCom. StartCom is a top-tier CA.
2020 Jul 05
2
dovecot oauth
> On 05/07/2020 19:43 Aki Tuomi <aki.tuomi at open-xchange.com> wrote:
>
>
> > On 04/07/2020 21:12 la.jolie at paquerette <la.jolie at paquerette.org> wrote:
> >
> >
> > Hello,
> >
> > I'm trying to configure roundcube / dovecot to work with keycloak.
> > I activated xoauth2 oauthbearer in dovecot.
> > But a problem
2016 Jun 15
1
https and self signed
...gt;> certificates.
>>
>> That???s because they are not top-tier CAs.
>
> I forgot to mention that letsencrypt.com uses one of its own certificates.
> You can use your browser???s certificate detail view to see the chain of
> trust. I see two levels here: IdenTrust -> TrustID -> Let???s Encrypt.
Thanks, that means no need to install CA. There is always someone (Thanks,
Warren!) who looked deeper into things, and can explain them. The only
thing here is: I need to look deeper myself how the identity of the server
is ensured in this case (i.e. whether tier 2, tier 3,...