Confirmed users, Administrators
5,526
edits
Line 5: | Line 5: | ||
This page explains how you can test that your certificates and OCSP infrastructure are working correctly according to the expectations of Mozilla, Firefox, and the NSS library; and conforms to the SSL protocol specifications (as interpreted by Mozilla/NSS software.) | This page explains how you can test that your certificates and OCSP infrastructure are working correctly according to the expectations of Mozilla, Firefox, and the NSS library; and conforms to the SSL protocol specifications (as interpreted by Mozilla/NSS software.) | ||
= Overview = | = EV-Readiness Check = | ||
To test your CA hierarchy to see if it is ready for EV treatment: | |||
# [https://support.mozilla.org/en-US/kb/profile-manager-create-and-remove-firefox-profiles#w_creating-a-profile Create a new Firefox profile] | |||
# Open Firefox with your new profile | |||
# Browse to http://cert-checker.allizom.org/ | |||
# Enter the URL to the test website for the EV certificate | |||
# Enter the PEM file for the root certificate (ending of file may be .pem or .cert) | |||
# Enter the EV Policy OID | |||
# The Description field is optional | |||
# Click on Run Checker | |||
A successful output will have the following form, as documented in [https://mxr.mozilla.org/mozilla-central/source/security/certverifier/ExtendedValidation.cpp ExtendedValidation.cpp] | |||
* | |||
= OLD -- Overview = | |||
To perform this test you will: | To perform this test you will: |