Red Hat CERTIFICATE SYSTEM 8 - DEPLOYMENT Deployment Manual page 105

Hide thumbs Also See for CERTIFICATE SYSTEM 8 - DEPLOYMENT:
Table of Contents

Advertisement

encryption key
enrollment
end entity
extensions field
F
Federal Bridge Certificate
Authority (FBCA)
fingerprint
FIPS PUBS 140-1
firewall
I
impersonation
input
intermediate CA
IP spoofing
J
JAR file
A private key used for encryption only. An encryption key and its
equivalent public key, plus a
dual key
pair.
constitute a
The process of requesting and receiving an X.509 certificate for use
public-key infrastructure
in a
public-key infrastructure
In a
certificate
entity that uses a
certificate
extensions.
See
A configuration where two CAs form a circle of trust by issuing
cross-pair certificates to each other and storing the two cross-pair
certificates as a single certificate pair.
certificate
fingerprint.
See
Federal Information Standards Publications (FIPS PUBS) 140-1 is
a US government standard for implementations of cryptographic
modules, hardware or software that encrypts and decrypts data
or performs other cryptographic operations, such as creating or
verifying digital signatures. Many products sold to the US government
must comply with one or more of the FIPS standards. See
www.itl.nist.gov/div897/pubs/fip140-1.htm.
A system or combination of systems that enforces a boundary
between two or more networks.
The act of posing as the intended recipient of information sent
over a network. Impersonation can take two forms:
misrepresentation.
In the context of the certificate profile feature, it defines the enrollment
form for a particular certificate profile. Each input is set, which then
dynamically creates the enrollment form from all inputs configured for
this enrollment.
A CA whose certificate is located between the root CA and the issued
certificate
certificate in a
The forgery of client IP addresses.
A digital envelope for a compressed collection of files organized
Java™ archive (JAR)
according to the
signing key
and its equivalent public key,
(PKI). Also known as registration.
(PKI), a person, router, server, or other
to identify itself.
chain.
format.
http://
spoofing
and
95

Advertisement

Table of Contents
loading

Table of Contents