Red Hat CERTIFICATE SYSTEM 8 - DEPLOYMENT Deployment Manual page 100

Hide thumbs Also See for CERTIFICATE SYSTEM 8 - DEPLOYMENT:
Table of Contents

Advertisement

Glossary
authentication module
authorization
automated enrollment
B
bind DN
C
CA certificate
CA hierarchy
CA server key
CA signing key
certificate
certificate authority (CA)
90
A set of rules (implemented as a Java™ class) for authenticating
an end entity, agent, administrator, or any other entity that needs to
interact with a Certificate System subsystem. In the case of typical
end-user enrollment, after the user has supplied the information
requested by the enrollment form, the enrollment servlet uses an
authentication module associated with that form to validate the
information and authenticate the user's identity. See servlet.
Permission to access a resource controlled by a server. Authorization
typically takes place after the ACLs associated with a resource have
been evaluated by a server. See
A way of configuring a Certificate System subsystem that allows
automatic authentication for end-entity enrollment, without human
intervention. With this form of authentication, a certificate request
that completes authentication module processing successfully is
automatically approved for profile processing and certificate issuance.
A user ID, in the form of a distinguished name (DN), used with a
password to authenticate to Red Hat Directory Server.
A certificate that identifies a certificate authority. See also
authority
(CA),
subordinate
A hierarchy of CAs in which a root CA delegates the authority to issue
certificates to subordinate CAs. Subordinate CAs can also expand
the hierarchy by delegating issuing status to other CAs. See also
certificate authority
(CA),
The SSL server key of the server providing a CA service.
The private key that corresponds to the public key in the CA
certificate. A CA uses its signing key to sign certificates and CRLs.
Digital data, formatted according to the X.509 standard, that specifies
the name of an individual, company, or other entity (the
name
of the certificate) and certifies that a
included in the certificate, belongs to that entity. A certificate is issued
and digitally signed by a
validity can be verified by checking the CA's
public-key cryptography
infrastructure
(PKI), a certificate must be issued and signed by a CA
that is trusted by other entities enrolled in the PKI.
A trusted entity that issues a
of the person or entity the certificate is intended to identify. A CA
also renews and revokes certificates and generates CRLs. The
access control list
CA,
root
CA.
subordinate
CA,
root
CA.
public
certificate authority
(CA). A certificate's
digital signature
techniques. To be trusted within a
certificate
after verifying the identity
(ACL).
certificate
subject
key, which is also
through
public-key

Advertisement

Table of Contents
loading

Table of Contents