Glossary - Red Hat CERTIFICATE SYSTEM 8 - DEPLOYMENT Deployment Manual

Hide thumbs Also See for CERTIFICATE SYSTEM 8 - DEPLOYMENT:
Table of Contents

Advertisement

Glossary

A
access control
access control instructions
(ACI)
access control list (ACL)
administrator
agent
agent-approved enrollment
agent services
attribute value assertion
(AVA)
audit log
auditor
authentication
The process of controlling what particular users are allowed to do. For
example, access control to servers is typically based on an identity,
established by a password or a certificate, and on rules regarding
what that entity can do. See also
An access rule that specifies how subjects requesting access are
to be identified or what rights are allowed or denied for a particular
access control list
subject. See
A collection of access control entries that define a hierarchy of access
rules to be evaluated when a server receives a request for access to
a particular resource. See
The person who installs and configures one or more Certificate
System managers and sets up privileged users, or agents, for them.
See also agent.
A user who belongs to a group authorized to manage
for a Certificate System manager. See also
agent,
Data Recovery Manager
An enrollment that requires an agent to approve the request before
the certificate is issued.
1. Services that can be administered by a Certificate System
through HTML pages served by the Certificate System subsystem for
which the agent has been assigned the necessary privileges.
2. The HTML pages for administering such services.
An assertion of the form attribute = value, where attribute is a tag,
such as o (organization) or uid (user ID), and value is a value
such as "Red Hat, Inc." or a login name. AVAs are used to form the
distinguished name (DN)
subject name
called the
A log that records various system events. This log can be signed,
providing proof that it was not tampered with, and can only be read by
an auditor user.
A privileged user who can view the signed audit logs.
Confident identification; assurance that a party to some computerized
transaction is not an impostor. Authentication typically involves
the use of a password, certificate, PIN, or other information to
validate identity over a computer network. See also
authentication,
certificate-based
server
authentication.
access control list
(ACL).
access control instructions
Certificate Manager
agent.
that identifies the subject of a certificate,
of the certificate.
authentication,
(ACL).
(ACI).
agent services
agent
password-based
client
authentication,
89

Advertisement

Table of Contents
loading

Table of Contents