diff options
author | Alex Gaynor <alex.gaynor@gmail.com> | 2015-07-13 21:17:31 -0400 |
---|---|---|
committer | Alex Gaynor <alex.gaynor@gmail.com> | 2015-07-13 21:17:31 -0400 |
commit | 5bcd8e88c4e81d1a1581213118fea6a8ff416cfb (patch) | |
tree | 73e381519ac45b1a87cc89e6943e9ad7d7a4c81e | |
parent | 0c91ddc5141ee56633397f1c3b7878f31524f90f (diff) | |
download | cryptography-5bcd8e88c4e81d1a1581213118fea6a8ff416cfb.tar.gz cryptography-5bcd8e88c4e81d1a1581213118fea6a8ff416cfb.tar.bz2 cryptography-5bcd8e88c4e81d1a1581213118fea6a8ff416cfb.zip |
line length and grammar
-rw-r--r-- | docs/x509/tutorial.rst | 12 |
1 files changed, 7 insertions, 5 deletions
diff --git a/docs/x509/tutorial.rst b/docs/x509/tutorial.rst index e2b64175..69cc5be0 100644 --- a/docs/x509/tutorial.rst +++ b/docs/x509/tutorial.rst @@ -11,13 +11,15 @@ When obtaining a certificate from a certificate authority (CA), the usual flow is: 1. You generate a private/public key pair. -2. You create a request for a certificate, which is signed by your key (to prove - that you own that key). +2. You create a request for a certificate, which is signed by your key (to + prove that you own that key). 3. You give your CSR to a CA (but *not* the private key). 4. The CA validates that you own the resource (e.g. domain) you want a certificate for. -5. The CA gives you a certificate, signed by them. Which identifies your public +5. The CA gives you a certificate, signed by them, which identifies your public key, and the resource you are authenticated for. +6. You configure your server to use that certificate, combined with your + private key, to server traffic. If you want to obtain a certificate from a typical commercial CA, here's how. First, you'll need to generate a private key, we'll generate an RSA key (these @@ -45,8 +47,8 @@ are the most common types of keys on the web right now): If you've already generated a key you can load it with :func:`~cryptography.hazmat.primitives.serialization.load_pem_public_key`. -Next we need to generate a certificate signing request. A typical CSR contains a -few details: +Next we need to generate a certificate signing request. A typical CSR contains +a few details: * Information about our public key (including a signature of the entire body). * Information about who *we* are. |