{{ session.user.gn }} {{ session.user.sn }} ({{session.user.name }}) settings

Mails will be sent to: {{ session.user.mail }}

You can click here to generate bundle for current user account.

{% if session.authority %}

Authority certificate

Several things such as CRL location and e-mails are hardcoded into the certificate and as such require complete reset of X509 infrastructure if some of them needs to be changed:

Mails will appear from: {{ session.authority.certificate.email_address }}

Authority settings

These can be reconfigured via /etc/certidude/server.conf on the server.

Outgoing mail server: {% if session.authority.outbox %} {{ session.authority.outbox }} {% else %} E-mail disabled {% endif %}

Authenticated users allowed from: {% if "0.0.0.0/0" in session.user_subnets %} anywhere

{% else %}

{% endif %}

Request submission is allowed from: {% if "0.0.0.0/0" in session.request_subnets %} anywhere

{% else %}

{% endif %}

Autosign is allowed from: {% if "0.0.0.0/0" in session.autosign_subnets %} anywhere

{% else %}

{% endif %}

Authority administration is allowed from: {% if "0.0.0.0/0" in session.admin_subnets %} anywhere

{% else %} {% endif %}

Authority administration allowed for:

{% else %}

Here you can renew your certificates

{% endif %} {% set s = session.certificate.identity %} {% if session.authority %}

Pending requests

Submit a certificate signing request with Certidude:

certidude setup client {{session.common_name}}

Signed certificates

Log

Revoked certificates

To fetch certificate revocation list:

curl {{window.location.href}}api/revoked/ | openssl crl -text -noout
{% endif %}