Red Hat CERTIFICATE SYSTEM 8 - DEPLOYMENT Deployment Manual page 106

Hide thumbs Also See for CERTIFICATE SYSTEM 8 - DEPLOYMENT:
Table of Contents

Advertisement

Glossary
Java™ archive (JAR) format
Java™ Cryptography
Architecture (JCA)
Java™ Development Kit
(JDK)
Java™ Native Interface
(JNI)
Java™ Security Services
(JSS)
K
KEA
key
key exchange
Key Exchange Algorithm
(KEA)
L
Lightweight Directory
Access Protocol (LDAP)
linked CA
M
manual authentication
96
A set of conventions for associating digital signatures, installer scripts,
and other information with files in a directory.
The API specification and reference developed by Sun Microsystems
for cryptographic services. See
docs/guide/security/CryptoSpec.Introduction.
Software development kit provided by Sun Microsystems for
developing applications and applets using the Java™ programming
language.
A standard programming interface that provides binary compatibility
across different implementations of the Java™ Virtual Machine (JVM)
on a given platform, allowing existing code written in a language
such as C or C++ for a single platform to bind to Java™. See
java.sun.com/products/jdk/1.2/docs/guide/jni/index.html.
A Java™ interface for controlling security operations performed by
Netscape Security Services (NSS).
Key Exchange Algorithm
See
A large number used by a
decrypt data. A person's
to encrypt messages intended for that person. The messages must
then be decrypted by using the corresponding
A procedure followed by a client and server to determine the
symmetric keys they will both use during an SSL session.
An algorithm used for key exchange by the US Government.
A directory service protocol designed to run over TCP/IP and across
multiple platforms. LDAP is a simplified version of Directory Access
Protocol (DAP), used to access X.500 directories. LDAP is under
IETF change control and has evolved to meet Internet requirements.
An internally deployed
signed by a public, third-party CA. The internal CA acts as the root
CA for certificates it issues, and the third- party CA acts as the root
CA for certificates issued by other CAs that are linked to the same
third-party root CA. Also known as "chained CA" and by other terms
used by different public CAs.
A way of configuring a Certificate System subsystem that requires
human approval of each certificate request. With this form of
http://java.sun.com/products/jdk/1.2/
(KEA).
cryptographic algorithm
public
key, for example, allows other people
certificate authority (CA)
http://
to encrypt or
private
key.
whose certificate is

Advertisement

Table of Contents
loading

Table of Contents