A certificate enables the subject to perform a specific task. To help control the usage of a certificate outside its intended purpose, restrictions are automatically placed on certificates. These restrictions can be applied by using the key usage extension.
Key usage is a restriction method that determines what a certificate can be used for. This allows the administrator to issue certificates that can only be used for specific tasks or certificates that be used for a broad range of functions. Key usage descriptions include “Digital signature” and “Allow key exchange only with key encryption.”
This video demonstrates how to configure Key usage bits in IBM Host on-Demand (HOD). It also demonstrates on how a secure connection can be configured using key usage.
Refer to the link below for more information about IBM Host On-Demand