Red Hat CERTIFICATE SYSTEM 8 - DEPLOYMENT Deployment Manual page 108

Hide thumbs Also See for CERTIFICATE SYSTEM 8 - DEPLOYMENT:
Table of Contents

Advertisement

Glossary
P
password-based
authentication
PKCS #7
PKCS #10
PKCS #11
PKCS #11 module
PKCS #12
private key
proof-of-archival (POA)
public key
public-key cryptography
98
profile. Each output is set, which then dynamically creates the form
from all outputs configured for this enrollment.
Confident identification by means of a name and password. See also
authentication,
certificate-based
The public-key cryptography standard that governs signing and
encryption.
The public-key cryptography standard that governs certificate
requests.
The public-key cryptography standard that governs cryptographic
tokens such as smart cards.
A driver for a cryptographic device that provides cryptographic
services, such as encryption and decryption, through the PKCS
#11 interface. A PKCS #11 module, also called a cryptographic
module or cryptographic service provider, can be implemented in
either hardware or software. A PKCS #11 module always has one
or more slots, which may be implemented as physical hardware
slots in some form of physical reader, such as for smart cards, or
as conceptual slots in software. Each slot for a PKCS #11 module
can in turn contain a token, which is the hardware or software device
that actually provides cryptographic services and optionally stores
certificates and keys. Red Hat provides a built-in PKCS #11 module
with Certificate System.
The public-key cryptography standard that governs key portability.
One of a pair of keys used in public-key cryptography. The private
key is kept secret and is used to decrypt data encrypted with the
public
key.
corresponding
Data signed with the private Data Recovery Manager transport key
that contains information about an archived end-entity key, including
key serial number, name of the Data Recovery Manager,
name
of the corresponding certificate, and date of archival. The
signed proof-of-archival data are the response returned by the Data
Recovery Manager to the Certificate Manager after a successful
key archival operation. See also
certificate.
One of a pair of keys used in public-key cryptography. The public
key is distributed freely and published as part of a certificate. It is
typically used to encrypt data sent to the public key's owner, who then
decrypts the data with the corresponding
A set of well-established techniques and standards that allow
an entity to verify its identity electronically or to sign and encrypt
electronic data. Two keys are involved, a public key and a private key.
authentication.
Data Recovery Manager transport
private
key.
subject

Advertisement

Table of Contents
loading

Table of Contents