chapter nine
9 Working with X.509 certificates: Life cycle and self-signing
This chapter covers
- Doing local development using a laptop-scoped certificate authority
- Creating X.509 digital certificates with the Automated Certificate Management Environment (ACME) protocol
- Renewing X.509 digital certificates using ACME
In chapter 8, we looked at what’s inside an X.509 certificate. Essentially, it has two things: a public key and a bunch of extra info about that key. We poked around in some of the most important bits, such as who the certificate belongs to (the subject), who gave it out (the issuer), how long it’s good for, and a few rules and restrictions.
We also learned how to check whether a certificate is legitimate: follow the trail of who issued it step by step all the way up to a trusted root certificate. The process is like checking whether someone’s ID was signed by someone you trust.