This is a diff between 1.2 and 1.3 revisions:

108a108
< * Manage ODS Datadspaces Objects WebID Access Control Lists (ACLs):
107d108
> * Manage ODS Dataspaces Objects <nop>WebID Access Control Lists (ACLs):
81a84
< 1 In the Preferences dialog, open the Advanced tab, and click the "View certificates" button.
< 1 Click the "Add exception" button and enter the address of the HTTPS server you've just
< configured, i.e., https://virtuoso.example.com:4433/
< 1 Click OK, and confirm the exception.
80d81
> 1 In the <b>Preferences</b> dialog, open the <b>Advanced</b> tab, and click the <b>View certificates</b> button.
> 1 Click the <b>Add exception</b> button and enter the address of the HTTPS server you've just
> configured, i.e., <b><code><nowiki>https://virtuoso.example.com:4433/</nowiki></code></b>
> 1 Click <b>OK</b>, and confirm the exception.
76a76
< 1 Click Save
75d76
> 1 Click <b>Save</b>
74a74
< 1 Edit the new listener, and click "Generate New" key.
73d74
> 1 Edit the new listener, and click <b>Generate New</b>
72a72
< 1 Click Configure HTTPS Listeners
71d72
> 1 Click <b>Configure HTTPS Listeners</b>
69a70
< 1 Go to System Admin-&gt;Security
< * Note: Suppose the CA-Authority Certificate is generated / imported already as per the previous sections from above.
68d70
> 1 Go to <b>System Admin</b> &#8594; <b>Security</b>.
65d66
> <i><b>Note</b> The following assumes the CA-Authority Certificate has been generated/imported already, as through the sections above.</i>
57a58
< 1 Click "Save".
< 1 Go to System Admin->Security->Public Key Infrastructure
56d57
> 1 Click <b>Save</b>
> 1 Go to <b>System Admin</b> &#8594; <b>Security</b> &#8594; <b>Public Key Infrastructure</b>
54a55
< 1 Click "Import Key".
< 1 On a successful import, the certificate should be presented in the "Cryptographic Keys" list:
53d54
> 1 Click <b>Import Key</b>
> 1 On a successful import, the certificate should now be presented in the <b>Cryptographic Keys</b> list:
52a52
< 1 Enter "Key Name": <b>id_rsa</b> and "Key Password": the password your CA Certificate has:
51d52
> 1 Enter <b>Key Name</b> <code>id_rsa</code> and <b>Key Password</b> the password your CA Certificate has:
50a50
< 1 In the presented form for "PKCS12 file:" click "Choose File" and select your CA Certificate, for ex. with name "example.p12":
49d50
> 1 In the presented form for <b>PKCS12 file</b>, click <b>Choose File</b> and select your CA Certificate; for example, with name <b>example.p12</b>:
47a47
< 1 For user "dba" click "Edit":
46d47
> 1 For user <b>dba</b>, click <b>Edit</b>:
45a45
< 1 Go to System Admin-&gt;User Accounts
44d45
> 1 Go to <b>System Admin</b> &#8594; <b>User Accounts</b>.
41a43
< * has <code>http://localhost:8890/dataspace/person/dba#this</code> as WebID.
< * is <code>Certification Authority (CA)Identity </code>
< * has <code>Self-Signed</code> Issuer
40d41
> * has <b><code><nowiki>http://localhost:8890/dataspace/person/dba#this</nowiki></code></b> as <nop>WebID
> * is <b>Certification Authority (CA) Identity</b>
> * has <b>Self-Signed</b> Issuer
32a32
< 1 Click "Generate".
31d32
> 1 Click <b>Generate</b>.
24a30
< 1 Enter in the presented form for ex:
< * "Country": US;
< * "State": MA;
< * "Organization": Example Inc. ;
< * "Organization Unit": Example ;
< * "Name": Root CA
< * "e-mail": <nowiki>dba@example.com</nowiki>
23d24
> 1 Fill in the form. For example:
> * <b>Country</b>: US
> * <b>State</b>: MA
> * <b>Organization</b>: Example Inc.
> * <b>Organization Unit</b>: Example
> * <b>Name</b>: Root CA
> * <b>e-mail</b>: <nowiki>dba@example.com</nowiki>
22a22
< 1 Go to System Admin-&gt;Security
21d22
> 1 Go to <b>System Admin</b> &#8594; <b>Security</b>
17a17
< ---++ Generating CA-Authority Certificate ( .p12 or .pfx )
16d17
> ---++ Generating CA-Authority Certificate (.p12 or .pfx)
5a5
< The steps that follow guide you through the process of setting up your Virtuoso instance for issuing CA-Authority notarized X.509 certificates that include WebID watermarks.
4d5
> The steps that follow guide you through the process of setting up your Virtuoso instance to issue CA-Authority-notarized X.509 certificates that include <nop>WebID watermarks.