Adobe 22002486 Digital Signature User Guide - Page 104

Using Root Certificates in the Windows Certificate Store

Page 104 highlights

Acrobat 9 Family of Products Security Feature User Guide Validating Signatures Using Root Certificates in the Windows Certificate Store 104 5. Check or uncheck Require that certificate revocation checking be done whenever possible during signature validation. This option checks certificates against a list of revoked certificates during validation, either with the Online Certificate Status Protocol (OCSP) or the Certificate Revocation List (CRL). If this option is not selected, the revocation status for approval signatures is ignored. Revocation checking always occurs for certificates associated with certification signatures. Note: Signature verification is similar to credit card validation. OCSP checking is like making a phone call to verify the card number. CRL checking is like checking the card numbers against a list. 6. In the Verification Time panel, select a time verification method:  Current time: The digital signature validation time.  Secure time: The secure timestamp server time if one is present and trusted, otherwise the current time.  Creation time: The signature creation time. 7.2.3 Using Root Certificates in the Windows Certificate Store The Windows Certificate Store contains a store called "Trusted Root Certificate Authorities" that contains numerous root certificates issued by different certification authorities. Certificates are "root" certificates by virtue of being at the top of the certificate chain hierarchy. There are two common ways a certificate ends up in the Windows Certificate Store root directory:  The computer manufacturer or Microsoft has put them there.  A company administrator has put them there as part of a company-wide program. Most home users should not trust all Windows root certificates by default because by trusting a root certificate you may be trusting all the content provided by the company that owns that certificate. Many root certificates ship with Windows, and users may have imported others as a result of some online action. Enterprise users, on the other hand, should consult company policy to determine whether or not to trust all Windows root certificates for validating signatures or certifying documents. This information should come from an administrator, though your application may already be configured with the correct settings. A common reason to trust Windows roots is so the administrator can manage from a central location the certificates deployed on a network. To use these certificates for signature validation: 1. Display the Windows Integration tab.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189

Acrobat 9 Family of Products
Validating Signatures
Security Feature User Guide
Using Root Certificates in the Windows Certificate Store
104
5.
Check or uncheck
Require that certificate revocation checking be done whenever possible during
signature validation
.
This option checks certificates against a list of revoked certificates during validation, either with the
Online Certificate Status Protocol (OCSP) or the Certificate Revocation List (CRL). If this option is not
selected, the revocation status for approval signatures is ignored.
Revocation checking always occurs for
certificates associated with certification signatures.
Note:
Signature verification is similar to credit card validation. OCSP checking is like making a
phone call to verify the card number. CRL checking is like checking the card numbers
against a list.
6.
In the Verification Time panel, select a time verification method:
Current time
: The digital signature validation time.
Secure time
: The secure timestamp server time if one is present and trusted, otherwise the current
time.
Creation time
: The signature creation time.
7.2.3
Using Root Certificates in the Windows Certificate Store
The Windows Certificate Store contains a store called “Trusted Root Certificate Authorities” that contains
numerous root certificates issued by different certification authorities. Certificates are “root” certificates by
virtue of being at the top of the certificate chain hierarchy. There are two common ways a certificate ends
up in the Windows Certificate Store root directory:
The computer manufacturer or Microsoft has put them there.
A company administrator has put them there as part of a company-wide program.
Most home users should not trust all Windows root certificates by default because by trusting a root
certificate you may be trusting all the content provided by the company that owns that certificate. Many
root certificates ship with Windows, and users may have imported others as a result of some online action.
Enterprise users, on the other hand, should consult company policy to determine whether or not to trust
all Windows root certificates for validating signatures or certifying documents. This information should
come from an administrator, though your application may already be configured with the correct settings.
A common reason to trust Windows roots is so the administrator can manage from a central location the
certificates deployed on a network.
To use these certificates for signature validation:
1.
Display the Windows Integration tab.