aboutsummaryrefslogtreecommitdiffstats
path: root/docs/x509/tutorial.rst
diff options
context:
space:
mode:
authorAlex Gaynor <alex.gaynor@gmail.com>2015-07-13 21:17:31 -0400
committerAlex Gaynor <alex.gaynor@gmail.com>2015-07-13 21:17:31 -0400
commit5bcd8e88c4e81d1a1581213118fea6a8ff416cfb (patch)
tree73e381519ac45b1a87cc89e6943e9ad7d7a4c81e /docs/x509/tutorial.rst
parent0c91ddc5141ee56633397f1c3b7878f31524f90f (diff)
downloadcryptography-5bcd8e88c4e81d1a1581213118fea6a8ff416cfb.tar.gz
cryptography-5bcd8e88c4e81d1a1581213118fea6a8ff416cfb.tar.bz2
cryptography-5bcd8e88c4e81d1a1581213118fea6a8ff416cfb.zip
line length and grammar
Diffstat (limited to 'docs/x509/tutorial.rst')
-rw-r--r--docs/x509/tutorial.rst12
1 files changed, 7 insertions, 5 deletions
diff --git a/docs/x509/tutorial.rst b/docs/x509/tutorial.rst
index e2b64175..69cc5be0 100644
--- a/docs/x509/tutorial.rst
+++ b/docs/x509/tutorial.rst
@@ -11,13 +11,15 @@ When obtaining a certificate from a certificate authority (CA), the usual
flow is:
1. You generate a private/public key pair.
-2. You create a request for a certificate, which is signed by your key (to prove
- that you own that key).
+2. You create a request for a certificate, which is signed by your key (to
+ prove that you own that key).
3. You give your CSR to a CA (but *not* the private key).
4. The CA validates that you own the resource (e.g. domain) you want a
certificate for.
-5. The CA gives you a certificate, signed by them. Which identifies your public
+5. The CA gives you a certificate, signed by them, which identifies your public
key, and the resource you are authenticated for.
+6. You configure your server to use that certificate, combined with your
+ private key, to server traffic.
If you want to obtain a certificate from a typical commercial CA, here's how.
First, you'll need to generate a private key, we'll generate an RSA key (these
@@ -45,8 +47,8 @@ are the most common types of keys on the web right now):
If you've already generated a key you can load it with
:func:`~cryptography.hazmat.primitives.serialization.load_pem_public_key`.
-Next we need to generate a certificate signing request. A typical CSR contains a
-few details:
+Next we need to generate a certificate signing request. A typical CSR contains
+a few details:
* Information about our public key (including a signature of the entire body).
* Information about who *we* are.