60 | | To secure the communication and authenticate the user to the service the X509 proxy certificate is needded. |
61 | | Client expects the access either to proxy certificate file or to pair of user certificate and private key files in "pem" format. |
62 | | |
63 | | If the user has the certificate in p12 format, the certificate has to be first converted to pem files. |
| 60 | To secure the communication and authenticate the user to the service the X509 proxy certificate is needded. |
| 61 | Client expects the access either to proxy certificate file or to pair of user certificate and private key files in "pem" format. |
| 62 | |
| 63 | If the user has the certificate in p12 format, the certificate has to be first converted to pem files. |