Hi Ppl,

as I was asked a few time - here is my "Quicklinks" Menu - put it here in menu.xml:

  <interface>
    <name>ra</name>
    <htdocs_prefix>/ra</htdocs_prefix>
    <cgi_prefix>/cgi-bin/ra/RAServer?</cgi_prefix>
    <logo_left></logo_left>
    <logo_right></logo_right>
    <menu>

<----- add here -------->

    <item>
        <id>2</id>   <---- set the id of General to "2" (was "1")
        <name>General</name>
        <item>


You receive a Link-Bar that gives you all necessary steps for issuing/revoking certificates in a standard 2 Maschine setup.

You have to modify the IP Adresses in the file to point to your CA-System.

There is one additional problem: In OpenCA Standard Setup you must Login on each Interface seperately which will break the deep link - I use No Authentication and take Apache for this :)

Feedback welcome

Oliver

--
Diese Nachricht wurde digital unterschrieben
oliwel's public key: http://www.oliwel.de/oliwel.crt
Basiszertifikat: http://www.ldv.ei.tum.de/page72
<item>
<id>1</id>
  <name>QuickMenu</name>
  <item>
      <name>Certificate Requests</name>
        <link>https://ca.ei.tum.de/cgi-bin/RAServer?cmd=listCSR;dataType=NEW_REQUEST;ra=;loa=</link>
        <target>main</target>
        </item>
        <item>
          <name>Revocation Requests</name>
          <link>https://ca.ei.tum.de/cgi-bin/RAServer?cmd=listCRR;dataType=NEW_CRR;ra=;loa=</link>
          <target>main</target>
      </item>
      <item>
         <name>Upload</name>
         <link>https://ca.ei.tum.de/cgi-bin/node/node?cmd=getParams;GET_PARAMS_CMD=nodeUploadAll</link>
        <target>main</target>
      </item>
      <item>
        <name>Import</name>
        <link>https://129.187.105.62/cgi-bin/node/node?cmd=getParams;GET_PARAMS_CMD=nodeReceiveAll</link>
        <target>main</target>
      </item>
      <item>
        <name>Revoke</name>
        <link>https://129.187.105.62/cgi-bin/ca/ca?cmd=listReqs;dataType=APPROVED_CRR</link>
        <target>main</target>
      </item>
      <item>
        <name>Revoke (auto)</name>
        <link>https://129.187.105.62/cgi-bin/batch/batch?cmd=getParams;GET_PARAMS_CMD=bpRevokeCertificate</link>
        <target>main</target>
      </item>
      <item>
        <name>CRL</name>
        <link>https://129.187.105.62/cgi-bin/ca/ca?cmd=getParams;GET_PARAMS_CMD=genCRL</link>
        <target>main</target>
      </item>
      <item>
        <name>Issue</name>
        <link>https://129.187.105.62/cgi-bin/ca/ca?cmd=listReqs;dataType=APPROVED_REQUEST</link>
        <target>main</target>
      </item>
      <item>
        <name>Issue (auto)</name>
        <link>https://129.187.105.62/cgi-bin/batch/batch?cmd=getParams;GET_PARAMS_CMD=bpIssueCertificate</link>
        <target>main</target>
      </item>
      <item>
        <name>Enroll</name>
        <link>https://129.187.105.62/cgi-bin/node/node?cmd=getParams;GET_PARAMS_CMD=nodeEnrollAll;GET_PARAMS_STEP=0</lin
k>
        <target>main</target>
      </item>
      <item>
         <name>Download</name>
         <link>https://ca.ei.tum.de/cgi-bin/node/node?cmd=getParams;GET_PARAMS_CMD=nodeDownloadAll;GET_PARAMS_STEP=0</li
nk>
        <target>main</target>
      </item>
</item>

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature



Reply via email to