It is the responsibility of the Appliance Administrator to add or remove trusted root certificates to the Safeguard for Privileged Passwords Appliance. If you are going to verify the server certificate, then you do need a certificate from the server certificates chain of trust in Trusted Certificates.

Examples:

  • If you uploaded a syslog client certificate with a private key, you may need to upload the certificate's root CA to the list of trusted certificates. For more information, see Syslog Client Certificate.
  • An SSL/TLS certificate must be trusted to resolve the chain of authority. For an SSL/TSL certificate, when Safeguard for Privileged Passwords connects to an asset that has the Verify SSL Certificate option enabled, the signing authority of the certificate presented by the asset is compared to the certificates in the trusted certificate store. For more information, see Directory Account, Verify SSL Certificate.

Go to the following:

  • web client: Navigate to Certificates > Trusted CA Certificates.

Select a certificate to display the following information for the user-supplied certificates added to the trusted certificate store.

Table 143: Trusted CA certificates: Properties
Property Description
Subject The name of the subject (such as user, program, computer, service or other entity) assigned to the certificate when it was requested.

Issued By

The name of the certificate authority (CA) that issued the certificate.

Certificate Type

Trusted

Thumbprint

A unique hash value that identifies the certificate.
Invalid Before A "start" date and time that must be met before a certificate can be used.
Expiration Date The date and time when the certificate expires and can no longer be used.

Toolbar options follow.

Table 144: Trusted Certificates: Toolbar
Option Description
Upload New Trusted CA Certificate

Add a trusted certificate.

Delete Selected

Delete the selected certificate.

Refresh

Update the list of certificates.