Configuring a user profile ······································································································································ 200
Overview ······································································································································································· 200
Creating a user profile ················································································································································ 200
Enabling a user profile ················································································································································ 201
Configuring password control ································································································································ 202
Overview ······································································································································································· 202
FIPS compliance ··························································································································································· 204
Enabling password control ········································································································································· 205
Configuring RSH ····················································································································································· 213
Configuration prerequisites ········································································································································· 213
Configuration procedure ············································································································································· 213
RSH configuration example ········································································································································ 213
Managing public keys ············································································································································ 216
FIPS compliance ··························································································································································· 216
Configuration task list ·················································································································································· 216
Displaying public keys ················································································································································· 220
Configuring PKI ······················································································································································· 226
Overview ······································································································································································· 226
PKI terms ······························································································································································· 226
PKI architecture ···················································································································································· 227
PKI operation ······················································································································································· 228
PKI applications ··················································································································································· 228
FIPS compliance ··························································································································································· 228
PKI configuration task list ············································································································································ 228
Configuring a PKI entity ·············································································································································· 229
Configuring a PKI domain ··········································································································································· 230
Requesting a certificate ··············································································································································· 232
Obtaining certificates ·················································································································································· 233
Verifying PKI certificates ·············································································································································· 234
v