Red Hat CERTIFICATE SYSTEM 8 - DEPLOYMENT Deployment Manual page 109

Hide thumbs Also See for CERTIFICATE SYSTEM 8 - DEPLOYMENT:
Table of Contents

Advertisement

public-key infrastructure
(PKI)
R
RC2, RC4
Red Hat Certificate System
registration
root CA
RSA algorithm
RSA key exchange
S
sandbox
Secure Sockets Layer
(SSL)
self tests
server authentication
server SSL certificate
servlet
public key
A
is published as part of a certificate, which associates that
key with a particular identity. The corresponding private key is kept
secret. Data encrypted with the public key can be decrypted only with
the private key.
The standards and services that facilitate the use of public-key
cryptography and X.509 v3 certificates in a networked environment.
Cryptographic algorithms developed for RSA Data Security by Rivest.
cryptographic
See also
A highly configurable set of software components and tools for
creating, deploying, and managing certificates. Certificate System is
comprised of five major subsystems that can be installed in different
Certificate System instances in different physical locations:
Manager, Online Certificate Status Manager,
Manager, Token Key Service, and Token Processing System.
See enrollment.
certificate authority (CA)
The
a certificate chain. See also
Short for Rivest-Shamir-Adleman, a public-key algorithm for both
encryption and authentication. It was developed by Ronald Rivest, Adi
Shamir, and Leonard Adleman and introduced in 1978.
A key-exchange algorithm for SSL based on the RSA algorithm.
A Java™ term for the carefully defined limits within which Java™
code must operate.
A protocol that allows mutual authentication between a client and
server and the establishment of an authenticated and encrypted
connection. SSL runs above TCP/IP and below HTTP, LDAP, IMAP,
NNTP, and other high-level network protocols.
A feature that tests a Certificate System instance both when the
instance starts up and on-demand.
The process of identifying a server to a client. See also
authentication.
A certificate used to identify a server to a client using the
Sockets Layer (SSL)
protocol.
Java™ code that handles a particular kind of interaction with end
entities on behalf of a Certificate System subsystem. For example,
algorithm.
Data Recovery
with a self-signed certificate at the top of
CA
certificate,
subordinate
Certificate
CA.
client
Secure
99

Advertisement

Table of Contents
loading

Table of Contents