single sign-on 1. In Certificate System, a password that simplifies the way you sign on to
Red Hat Certificate System by storing the passwords for the internal database and tokens.
Each time you log on, you're required to enter just this single password. 2. The ability for a
user to log in once to a single computer and be authenticated automatically by a variety of
servers within a network. Partial single sign-on solutions can take many forms, including
mechanisms for automatically tracking passwords used with different servers. Certificates
support single sign-on within a public-key infrastructure (PKI). A user can log in once to a
local client's private-key database and thereafter, as long as the client software is running,
rely on certificate-based authentication to access each server within an organization that the
user is allowed to access.
slot The portion of a PKCS #11 module (implemented in either hardware or software) that
contains a token.
smart card A small device, typically about the size of a credit card, that contains a
microprocessor and is capable of storing cryptographic information (such as keys and
certificates) and performing cryptographic operations. Smart cards implement some or all
of the PKCS #11 interface.
spoofing The act of pretending to be someone else. For example, a person can pretend to
have the email address
, or a computer can identify itself as a site
jdoe@example.com
called
when it is not. Spoofing is one form of impersonation. See also
www.redhat.com
misrepresentation, impersonation.
SSL See Secure Sockets Layer (SSL).
subject The entity identified by a certificate. In particular, the subject field of a certificate
contains a subject name that uniquely describes the certified entity.
subject name A distinguished name (DN) that uniquely describes the subject of a
certificate.
subordinate CA A certificate authority whose certificate is signed by another
subordinate CA or by the root CA. See CA certificate, root CA.
symmetric encryption An encryption method that uses the same cryptographic key to
encrypt and decrypt a given message.
tamper detection A mechanism ensuring that data received in electronic form has not
been tampered with; that is, that the data received entirely corresponds with the original
version of the same data.
Glossary
827
Need help?
Do you have a question about the CERTIFICATE SYSTEM 7.1 - ADMINISTRATOR and is the answer not in the manual?
Questions and answers