Hardware Cryptographic Accelerators - Red Hat CERTIFICATE SYSTEM 7.3 - ADMINISTRATION Administration Manual

Hide thumbs Also See for CERTIFICATE SYSTEM 7.3 - ADMINISTRATION:
Table of Contents

Advertisement

TokenInfo
This utility will return all tokens which can be detected by the Certificate System, not only tokens which
are installed in the Certificate System.

12.5. Hardware Cryptographic Accelerators

The Certificate System can use hardware cryptographic accelerators with external tokens. Many of the
accelerators provide the following security features:
• Fast SSL connections. Speed is important to accommodate a high number of simultaneous
enrollment or service requests.
• Hardware protection of private keys. These devices behave like smart cards by not allowing private
keys to be copied or removed from the hardware token. This is important as a precaution against
key theft from an active attack of an online Certificate Manager.
Hardware Cryptographic Accelerators
269

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CERTIFICATE SYSTEM 7.3 - ADMINISTRATION and is the answer not in the manual?

Questions and answers

Table of Contents