Certificates

Certificates are used in secure communications to encrypt and decrypt data. You create certificates using certificate creation software such as IBM Key Management Utility (iKeyman Utility).

Each certificate is made up of two components: the public key and the private key. Always keep your private key secret.

Note: All key certificates used by Secure Proxy must specify "Basic constraints CA True" to be valid. Otherwise, a handshake error will occur indicating that the CA cert does not have the basic constraint CA:true.