
To access these job step components, double-click ProvisioningNwExt or NiagaraNetworkJobPrototype. The Niagara Network Job Builder or the Niagara Network Prototype View view opens. In the top pane Provisioning steps to run click the (+) symbol and click Generate Certficate.
| Property | Value | Description |
|---|---|---|
| Alias | text | Provides a short name used to distinguish certificates. |
| Common Name (CN) | text | Defines the host name or the address of the server. |
| Organizational Unit (OU) | text | The name of a department within the organization or a Doing-Business-As (DBA entry). |
| Organization (O) | text | The legally registered name of your company or organization. Do not abbreviate this name. |
| Locality (L) | text | The city in which the organization for which you are creating the certificate is located. |
| State/Province (ST) | text | The complete name of the state or province in which your organization is located. This property is optional. |
| Country Code (C) | two-character ISO-format country code | If you do not know your country's two-character code, check www.countrycode.org. |
| Not Before | date | Specifies the date before which the certificate is not valid. |
| Not After | date | Specifies the expiration date for the certificate. |
| Key Size | number | Specifies the size of the keys in bits. Four key sizes are allowed: 1024 bits, 2048 bits (this is the default), 3072 bits, and 4096 bits. Larger keys take longer to generate but offer greater security. |
| Certificate Usage: | text | Specifies the purpose of the certificate. |
| Alternate Server Name | text | This property provides a name other than the Subject (Common Name) that the system can use to connect to the server. |
| Alternate Server URI | text | Provides an alternate server URI that the system can use to connect the server. |
| Email Address | email address | The contact address for this certificate. It may also be the address to which your signed certificate (.pem file) will be sent. |
| Email Address | check box | Indicates the business scenario that requires authentication, encryption, and digital signing. The public and private keys associated with each certificate may be used to provide these secure features. |