Glossary
Java™ Security Services
(JSS)
K
KEA
key
key exchange
Key Exchange Algorithm
(KEA)
L
Lightweight Directory
Access Protocol (LDAP)
linked CA
M
manual authentication
MD5
message digest
misrepresentation
478
such as C or C++ for a single platform to bind to Java™. See
java.sun.com/products/jdk/1.2/docs/guide/jni/index.html.
A Java™ interface for controlling security operations performed by
Netscape Security Services (NSS).
Key Exchange Algorithm
See
A large number used by a
decrypt data. A person's
to encrypt messages intended for that person. The messages must
then be decrypted by using the corresponding
A procedure followed by a client and server to determine the
symmetric keys they will both use during an SSL session.
An algorithm used for key exchange by the US Government.
A directory service protocol designed to run over TCP/IP and across
multiple platforms. LDAP is a simplified version of Directory Access
Protocol (DAP), used to access X.500 directories. LDAP is under
IETF change control and has evolved to meet Internet requirements.
An internally deployed
signed by a public, third-party CA. The internal CA acts as the root
CA for certificates it issues, and the third- party CA acts as the root
CA for certificates issued by other CAs that are linked to the same
third-party root CA. Also known as "chained CA" and by other terms
used by different public CAs.
A way of configuring a Certificate System subsystem that requires
human approval of each certificate request. With this form of
authentication, a servlet forwards a certificate request to a request
queue after successful authentication module processing. An
agent with appropriate privileges must then approve each request
individually before profile processing and certificate issuance can
proceed.
A message digest algorithm that was developed by Ronald Rivest.
one-way
hash.
See also
one-way
hash.
See
The presentation of an entity as a person or organization that it is not.
For example, a website might pretend to be a furniture store when it
(KEA).
cryptographic algorithm
public
key, for example, allows other people
certificate authority (CA)
http://
to encrypt or
private
key.
whose certificate is
Need help?
Do you have a question about the CERTIFICATE SYSTEM 7.2 - ADMINISTRATION and is the answer not in the manual?
Questions and answers