Red Hat CERTIFICATE SYSTEM 8.0 - ADMINISTRATION Admin Manual page 551

Hide thumbs Also See for CERTIFICATE SYSTEM 8.0 - ADMINISTRATION:
Table of Contents

Advertisement

M
manual authentication
MD5
message digest
misrepresentation
N
Netscape Security Services
(NSS)
nonrepudiation
O
object signing
object-signing certificate
OCSP
one-way hash
third-party root CA. Also known as "chained CA" and by other terms
used by different public CAs.
A way of configuring a Certificate System subsystem that requires
human approval of each certificate request. With this form of
authentication, a servlet forwards a certificate request to a request
queue after successful authentication module processing. An
agent with appropriate privileges must then approve each request
individually before profile processing and certificate issuance can
proceed.
A message digest algorithm that was developed by Ronald Rivest.
one-way
hash.
See also
one-way
hash.
See
The presentation of an entity as a person or organization that it is not.
For example, a website might pretend to be a furniture store when it
is really a site that takes credit-card payments but never sends any
goods. Misrepresentation is one form of impersonation. See also
spoofing.
A set of libraries designed to support cross-platform development
of security-enabled communications applications. Applications built
using the NSS libraries support the
protocol for authentication, tamper detection, and encryption, and the
PKCS #11 protocol for cryptographic token interfaces. NSS is also
available separately as a software development kit.
The inability by the sender of a message to deny having sent the
digital signature
message. A
A method of file signing that allows software developers to sign
Java code, JavaScript scripts, or any kind of file and allows users to
identify the signers and control access by signed code to local system
resources.
A certificate that's associated private key is used to sign objects;
object
signing.
related to
Online Certificate Status Protocol.
1. A number of fixed-length generated from data of arbitrary length
with the aid of a hashing algorithm. The number, also called a
message digest, is unique to the hashed data. Any change in the
Secure Sockets Layer (SSL)
provides one form of nonrepudiation.
529

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CERTIFICATE SYSTEM 8.0 - ADMINISTRATION and is the answer not in the manual?

Questions and answers

Table of Contents