Introduction To Pki; Pki Overview; Pki Terms - 3Com MSR 50 Series Configuration Manual

3com msr 30-16: software guide
Hide thumbs Also See for MSR 50 Series:
Table of Contents

Advertisement

97

Introduction to PKI

PKI Overview

PKI Terms

PKI C
ONFIGURATION
When configuring PKI, go to these sections for information you are interested in:
"Introduction to PKI" on page 1829
"PKI Configuration Task List" on page 1832
"Displaying and Maintaining PKI" on page 1840
"PKI Configuration Examples" on page 1840
"Troubleshooting PKI" on page 1848
Public key infrastructure (PKI) is a system designed for providing information
security through public key technologies and digital certificates and verifying the
identities of the digital certificate owners.
PKI employs digital certificates, which are bindings of certificate owner identity
information and public keys. PKI allows users to request certificates, use
certificates, and revoke certificates. By leveraging digital certificates and relevant
services like certificate distribution and blacklist publication, PKI supports
authentication the entities involved in communication, and thus guaranteeing the
confidentiality, integrity and non-repudiation of data.
Digital certificate
A digital certificate is a file signed by a certificate authority (CA) that contains a
public key and the related user identity information. A simplest digital certificate
contains a public key, an entity name, and a digital signature from the CA.
Generally, a digital certificate also includes the validity period of the key, the name
of the CA and the sequence number of the certificate. A digital certificate must
comply with the international standard of ITUTX.5.9. This manual involves two
types of certificates: local certificate and CA certificate. A local certificate is a
digital certificate signed by a CA for an entity, while a CA certificate, also known
as root certificate, is signed by the CA for itself.
CRL
An existing certificate may need to be revoked when, for example, the user name
changes, the private key leaks, or the user stops the business. Revoking a
certificate is to remove the binding of the public key with the user identity
information. In PKI, the revocation is made well known through certificate
revocation lists (CRLs). Whenever a certificate is revoked, the CA publishes one or
more CRLs to announce that the certificate is invalid. The CRLs contains the serial
numbers of all certificates that are revoked and function an effective way for
checking the validity of certificates.

Hide quick links:

Advertisement

Table of Contents

Troubleshooting

loading

Table of Contents