Generate an X.509 Certificate (with a WebID? watermark) to be managed by the Firefox browser-based keystore
Prerequisites
- Set up an X.509 certificate issuer and HTTPS listener.
- Set up an X.509 Certificate Service.
Certificate Generation Process
These steps will work against any ODS instance where you have the requisite privileges.
- Go to the ODS home page (local or remote) and log in as an ODS user (registering as such first, if necessary).

- After log in, you will have an ODS-generated Person Entity Identifier (an HTTP URI that Identifies "You") of the form:
http://cname/dataspace/person/user-name#this

- Fill out your profile, if still in default state.
(Note: If this step is skipped, the resulting X.509 certificate may not have a human-readable name.)

- Go to Security:

- Go to Certificate Generator:

- Fill out the form, for example:
- Country:
UK
;
- Organization:
OL
;
- Valid for:
90 hours
.

- Click Submit certificate request.
- Firefox should show that it is generating a private key:

- When private key generation is finished, Firefox should report a successful installation of the certificate:

- Go to X.509 Certificates.
- The new certificate should be shown in the list of certificates available for the ODS user:

- Note you have now also the option automatic WebID? Login set to enabled -- a powerful feature benefits of which we will demonstrate next in our example:

- Verify the new certificate by performing the following steps:
- Log out and access https://id.myopenlink.net/ods/;
- When prompted by your browser, select the new certificate generated above:

- You should then be presented with the ODS Log-in form.
Click WebID? Login:

- You should now be successfully logged in:

- If you now log in as another user (e.g.,
demo
), you can share a resource to the above user, using a WebID-based ACL, which is itself enabled by the new WebID?-watermarked X.509 Certificate.
Related