Red Hat CERTIFICATE SYSTEM 8 - DEPLOYMENT Deployment Manual page 107

Hide thumbs Also See for CERTIFICATE SYSTEM 8 - DEPLOYMENT:
Table of Contents

Advertisement

MD5
message digest
misrepresentation
N
Netscape Security Services
(NSS)
nonrepudiation
O
object signing
object-signing certificate
OCSP
one-way hash
operation
output
authentication, a servlet forwards a certificate request to a request
queue after successful authentication module processing. An
agent with appropriate privileges must then approve each request
individually before profile processing and certificate issuance can
proceed.
A message digest algorithm that was developed by Ronald Rivest.
one-way
hash.
See also
one-way
hash.
See
The presentation of an entity as a person or organization that it is not.
For example, a website might pretend to be a furniture store when it
is really a site that takes credit-card payments but never sends any
goods. Misrepresentation is one form of impersonation. See also
spoofing.
A set of libraries designed to support cross-platform development
of security-enabled communications applications. Applications built
using the NSS libraries support the
protocol for authentication, tamper detection, and encryption, and the
PKCS #11 protocol for cryptographic token interfaces. NSS is also
available separately as a software development kit.
The inability by the sender of a message to deny having sent the
digital signature
message. A
A technology that allows software developers to sign Java™ code,
JavaScript scripts, or any kind of file and allows users to identify the
signers and control access by signed code to local system resources.
A certificate that's associated private key is used to sign objects using
the technology known as
Online Certificate Status Protocol.
1. A number of fixed-length generated from data of arbitrary length
with the aid of a hashing algorithm. The number, also called a
message digest, is unique to the hashed data. Any change in the
data, even deleting or altering a single character, results in a different
value.
2. The content of the hashed data cannot be deduced from the hash.
The specific operation, such as read or write, that is being allowed or
denied in an access control instruction.
In the context of the certificate profile feature, it defines the resulting
form from a successful certificate enrollment for a particular certificate
Secure Sockets Layer (SSL)
provides one form of nonrepudiation.
object
signing.
97

Advertisement

Table of Contents
loading

Table of Contents