Mails will be sent to: {{ session.user.mail }}
You can click here to generate bundle for current user account.
{% if session.authority %}Several things such as CRL location and e-mails are hardcoded into the certificate and as such require complete reset of X509 infrastructure if some of them needs to be changed:
Mails will appear from: {{ session.authority.certificate.email_address }}
These can be reconfigured via /etc/certidude/server.conf on the server.
Outgoing mail server: {% if session.authority.outbox %} {{ session.authority.outbox }} {% else %} E-mail disabled {% endif %}
Authenticated users allowed from: {% if "0.0.0.0/0" in session.user_subnets %} anywhere
{% else %}Request submission is allowed from: {% if "0.0.0.0/0" in session.request_subnets %} anywhere
{% else %}Autosign is allowed from: {% if "0.0.0.0/0" in session.autosign_subnets %} anywhere
{% else %}Authority administration is allowed from: {% if "0.0.0.0/0" in session.admin_subnets %} anywhere
{% else %}Authority administration allowed for:
Here you can renew your certificates
{% endif %} {% set s = session.certificate.identity %} {% if session.authority %}Submit a certificate signing request with Certidude:
certidude setup client {{session.common_name}}
No certificate signing requests to sign!
To fetch certificate revocation list:
curl {{window.location.href}}api/revoked/ | openssl crl -text -noout