Managing Certificate Trust And Trusted Identities; What Is A Trusted Identity - Adobe 22002484 Manual

Security guide
Hide thumbs Also See for 22002484:
Table of Contents

Advertisement

3

Managing Certificate Trust and Trusted Identities

As described in
a public key and a private key. Participants in signing and certificate security workflows need to exchange
the public part (the certificate) of their digital ID. Once you obtain someone's certificate and add it to your
trusted identities list, you can encrypt documents for them. If their certificate does not already chain up to
a trust anchor that you have specified, you can set the certificate's trust level so that you can validate the
owner's signature.
Understanding what a trusted identity is and how trust levels are set can help you set up streamlined
workflows and troubleshoot problems. For example, you can add trusted identities ahead of time and
individually set each certificate's trust settings. In enterprise settings where certificates are stored on a
directory server, you may also be able to search for certificates to expand your list of trusted identities.
For more information, refer to the following:
"What is a Trusted Identity?" on page 30
"Using Directory Servers to Add Trusted Identities" on page 40
"Adding Someone to Your Trusted Identity List" on page 32
"Managing Contacts" on page 43

3.1 What is a Trusted Identity?

Digital signature and certificate security workflows both rely on certificates. Participants in signing
workflows share their certificates ahead of time or embed them in a document. Participants in certificate
security workflows must share their certificates ahead of time. Both operations involve importing other
people's certificates into your Trusted Identities list. When a person's certificate information appears in the
Trusted Identity Manager, they become a trusted identity.
Groups of people that share documents with certificate security or digital signatures are in essence a
community of trusted identities that share their certificates to make those features work. You will add
people to your trusted identity list and others will add you to theirs:
When you sign document, the document recipient can validate your signature by validating the
certificate embedded in the document. Conversely, you need access to a document sender's certificate
to validate their signature.
You encrypt a document with the document recipient's public key so that they can decrypt it with their
corresponding private key. Conversely, others need your certificate to encrypt documents for you.
"What is a Digital ID?" on page
10, a digital ID consists of two main parts: a certificate with
30

Advertisement

Table of Contents
loading

This manual is also suitable for:

Acrobat 9.0Reader 9.0

Table of Contents