Red Hat CERTIFICATE SYSTEM 8 - DEPLOYMENT Deployment Manual page 103

Hide thumbs Also See for CERTIFICATE SYSTEM 8 - DEPLOYMENT:
Table of Contents

Advertisement

CRMF
cross-certification
cryptographic algorithm
Cryptographic Message
Syntax (CS)
cryptographic module
cryptographic service
provider (CSP)
CSP
D
Data Recovery Manager
Data Recovery Manager
agent
Data Recovery Manager
recovery agent
Data Recovery Manager
storage key
Data Recovery Manager
transport certificate
each other, and then store both cross-pair certificates as a certificate
pair.
Certificate Request Message Format
See
The exchange of certificates by two CAs in different certification
hierarchies, or chains. Cross-certification extends the chain of trust
so that it encompasses both hierarchies. See also
(CA).
A set of rules or directions used to perform cryptographic operations
encryption
and decryption.
such as
The syntax used to digitally sign, digest, authenticate, or encrypt
arbitrary messages, such as CMMF.
PKCS #11
module.
See
A cryptographic module that performs cryptographic services, such
as key generation, key storage, and encryption, on behalf of software
that uses a standard interface such as that defined by PKCS #11 to
request such services.
cryptographic service provider
See
An optional, independent Certificate System subsystem that manages
the long-term archival and recovery of RSA encryption keys for
end entities. A Certificate Manager can be configured to archive
end entities' encryption keys with a Data Recovery Manager before
issuing new certificates. The Data Recovery Manager is useful only
if end entities are encrypting data, such as sensitive email, that the
organization may need to recover someday. It can be used only with
end entities that support dual key pairs: two separate key pairs, one
for encryption and one for digital signatures.
A user who belongs to a group authorized to manage agent services
for a Data Recovery Manager, including managing the request queue
and authorizing recovery operation using HTML-based administration
pages.
One of the m of n people who own portions of the storage key for the
Data Recovery
Manager.
Special key used by the Data Recovery Manager to encrypt the end
entity's encryption key after it has been decrypted with the Data
Recovery Manager's private transport key. The storage key never
leaves the Data Recovery Manager.
Certifies the public key used by an end entity to encrypt the entity's
encryption key for transport to the Data Recovery Manager. The Data
Recovery Manager uses the private key corresponding to the certified
public key to decrypt the end entity's key before encrypting it with the
storage key.
(CRMF).
certificate authority
(CSP).
93

Advertisement

Table of Contents
loading

Table of Contents