Red Hat CERTIFICATE SYSTEM 8 - DEPLOYMENT Deployment Manual page 111

Hide thumbs Also See for CERTIFICATE SYSTEM 8 - DEPLOYMENT:
Table of Contents

Advertisement

subordinate CA
symmetric encryption
T
tamper detection
token
tree hierarchy
trust
V
virtual private network
(VPN)
A certificate authority that's certificate is signed by another
subordinate CA or by the root CA. See
An encryption method that uses the same cryptographic key to
encrypt and decrypt a given message.
A mechanism ensuring that data received in electronic form entirely
corresponds with the original version of the same data.
A hardware or software device that is associated with a
PKCS #11
module. It provides cryptographic services and optionally
stores certificates and keys.
The hierarchical structure of an LDAP directory.
Confident reliance on a person or other entity. In a
infrastructure
(PKI), trust refers to the relationship between the
user of a certificate and the
certificate. If a CA is trusted, then valid certificates issued by that CA
can be trusted.
A way of connecting geographically distant divisions of an enterprise.
The VPN allows the divisions to communicate over an encrypted
channel, allowing authenticated, confidential transactions that would
normally be restricted to a private network.
CA
certificate,
certificate authority (CA)
root
CA.
slot
in a
public-key
that issued the
101

Advertisement

Table of Contents
loading

Table of Contents