Red Hat CERTIFICATE SYSTEM 8 - DEPLOYMENT Deployment Manual page 110

Hide thumbs Also See for CERTIFICATE SYSTEM 8 - DEPLOYMENT:
Table of Contents

Advertisement

Glossary
SHA-1
signature algorithm
signed audit log
signing certificate
signing key
single sign-on
slot
smart card
spoofing
SSL
subject
subject name
100
certificate enrollment, revocation, and key recovery requests are each
handled by separate servlets.
Secure Hash Algorithm, a hash function used by the US government.
A cryptographic algorithm used to create digital signatures. Certificate
System supports the MD5 and
cryptographic
algorithm,
audit
log.
See
A certificate that's public key corresponds to a private key used to
create digital signatures. For example, a Certificate Manager must
have a signing certificate that's public key corresponds to the private
key it uses to sign the certificates it issues.
A private key used for signing only. A signing key and its equivalent
encryption key
public key, plus an
dual key
pair.
constitute a
1. In Certificate System, a password that simplifies the way to sign
on to Red Hat Certificate System by storing the passwords for
the internal database and tokens. Each time a user logs on, he is
required to enter this single password.
2. The ability for a user to log in once to a single computer and be
authenticated automatically by a variety of servers within a network.
Partial single sign-on solutions can take many forms, including
mechanisms for automatically tracking passwords used with different
servers. Certificates support single sign-on within a
infrastructure
(PKI). A user can log in once to a local client's private-
key database and, as long as the client software is running, rely
certificate-based authentication
on
organization that the user is allowed to access.
PKCS #11
The portion of a
or software, that contains a token.
A small device that contains a microprocessor and stores
cryptographic information, such as keys and certificates, and
performs cryptographic operations. Smart cards implement some or
PKCS #11
all of the
interface.
Pretending to be someone else. For example, a person can pretend
to have the email address jdoe@example.com, or a computer
can identify itself as a site called www.redhat.com when it is not.
Spoofing is one form of impersonation. See also misrepresentation.
Secure Sockets Layer
See
The entity identified by a certificate. In particular, the subject field
of a certificate contains a
certified entity.
distinguished name (DN)
A
certificate.
SHA-1
signing algorithms. See also
digital
signature.
and its equivalent public key,
to access each server within an
module, implemented in either hardware
(SSL).
subject name
that uniquely describes the
that uniquely describes the
public-key
subject
of a

Advertisement

Table of Contents
loading

Table of Contents