Shared System Certificate Storage
Enterprise Linux
A well-known widely used open source operating system. uses Shared System Certificates storage, which allows NSS (Network
In the context of CMP, the infrastructure on which usage of registered customers will be measured – this could be a mobile phone network, broadband network or other non-telecommunications network. Security Services), GnuTLS (GNU Transport Layer Security), OpenSSL (Open Secure Sockets Layer), and Java
A widely used object-oriented programming language that is designed for use in the distributed environment of the internet. It is the most popular programming language for Android smartphone applications to share a default source - or trust store - for retrieving system certificate anchors and blacklist information. This includes the SSL certificates that CMP
Converged Monetisation Platform. The MDS Global product that supports customer care and billing for digital service providers. uses for authentication with the third party
Of software; a reusable component developed to be either freely distributed or sold by an entity other than the original vendor of the development platform. software with which it is integrated.
The consolidated system-wide trust store is located in the following directories:
-
/etc/pki/ca-trust/ -
/usr/share/pki/ca-trust-source/
The CMP Ansible installer calls update-ca-trust. Briefly, this command searches for certificates and trust settings in the subdirectories of the directories above and creates an extract of consolidated configuration files, which is output to the following directory: /etc/pki/ca-trust/extracted, where compatible applications can read the files.
To accommodate legacy applications that might expect certificates and trust configuration in a fixed location, contained in files with particular path and name, the classic file names are changed to symbolic links in the output. The symbolic links refer to dynamically created and consolidated output stored in the trust store directory hierarchy.
So you must select the correct subdirectory for adding files because the subdirectory defines how certificates therein will be trusted or distrusted, and which file formats are read. Follow the methodology described in this Linux Security Guide topic.
For more information about the update-ca-trust command, consult the Linux Manual Page.