Non-profit, member-based IT support for research & educational institutions


Learning about Digital Certificates and Certificate Authorities
Learn how to load the CREN Root into your browser. Take a few minutes to click through the instructions to download the CREN CA root certificate into your browser. With the CREN CA Root in your list of root certificates, you can go to websites protected by a CREN web server certificate and the server will recognize you.
[Download: MS-Word] OR PDF]
 
JSTOR - A resource database that recognizes CREN digital certificate signatures
This one-pager describes how JSTOR, a well known journal database provider, programmed their server to look for and use digital certificates to authorize sign-in at the log in server. This is one example of an application that has been PKI-enabled.
[Download: MS-Word OR PDF]
PGP - How to install and use PGP with MSIE and Windows
Common questions answered about how and why to protect your public key. What to look for and what questions to ask when designing your PKI.
[Download: MS-Word OR PDF]
 
What is a Hardware Security Module (HSM) Used for in a Certificate Authority?
One of the most important responsibilities in using digital certificates is protecting your private key. Protecting the private key of your campus certificate authority is even more critical. A hardware security module can help make this easy and manageable at a fairly reasonable cost.
[Download: MS-Word OR PDF]
 
nCipher Hardware Security Module
UNDER CONSTRUCTION
nCipher is a Hardware Security Module from nCipher (https://www.ncipher.com).  This one-pager describes how to install the software and hardware components needed to use the nCipher HSM to protect your private key.  These instructions are written for Windows 2000 Server, however, the software is available for Solaris and other forms of Unix as well.
[Download: MS-Word OR PDF]
 
Chrysalis Hardware Security Module
UNDER CONSTRUCTION
Chrysalis is a Hardware Security Module from Chrysalis-ITS (https://www.chrysalis-its.com). This one-pager describes how to install the software and hardware components needed to use the Chrysalis HSM to protect your private key. These instructions are written for Windows 2000 Server, however, the software is available for Solaris and other forms of Unix as well.
[Download: MS-Word OR PDF]
 
Get a FREE TRIAL Digital Cert to Sign Email
UNDER CONSTRUCTION
This is a complete set of instructions for use with Internet Explorer and Outlook ONLY. If you'd like to try to use a certificate to sign an email in Outlook then take a walk through this exercise on how to get and use a VeriSign certificate with Internet Explorer 5 and Outlook.  There are additional instructions at the VeriSign website for other combinations but CREN has not tested their accuracy.
[Download: MS-Word OR PDF]