Glossary
operation
output
P
password-based
authentication
PKCS #7
PKCS #10
PKCS #11
PKCS #11 module
PKCS #12
private key
proof-of-archival (POA)
530
data, even deleting or altering a single character, results in a different
value.
2. The content of the hashed data cannot be deduced from the hash.
The specific operation, such as read or write, that is being allowed or
denied in an access control instruction.
In the context of the certificate profile feature, it defines the resulting
form from a successful certificate enrollment for a particular certificate
profile. Each output is set, which then dynamically creates the form
from all outputs configured for this enrollment.
Confident identification by means of a name and password. See also
authentication,
certificate-based
The public-key cryptography standard that governs signing and
encryption.
The public-key cryptography standard that governs certificate
requests.
The public-key cryptography standard that governs cryptographic
tokens such as smart cards.
A driver for a cryptographic device that provides cryptographic
services, such as encryption and decryption, through the PKCS
#11 interface. A PKCS #11 module, also called a cryptographic
module or cryptographic service provider, can be implemented in
either hardware or software. A PKCS #11 module always has one
or more slots, which may be implemented as physical hardware
slots in some form of physical reader, such as for smart cards, or
as conceptual slots in software. Each slot for a PKCS #11 module
can in turn contain a token, which is the hardware or software device
that actually provides cryptographic services and optionally stores
certificates and keys. Red Hat provides a built-in PKCS #11 module
with Certificate System.
The public-key cryptography standard that governs key portability.
One of a pair of keys used in public-key cryptography. The private
key is kept secret and is used to decrypt data encrypted with the
public
key.
corresponding
Data signed with the private Data Recovery Manager transport key
that contains information about an archived end-entity key, including
key serial number, name of the Data Recovery Manager,
name
of the corresponding certificate, and date of archival. The
signed proof-of-archival data are the response returned by the Data
Recovery Manager to the Certificate Manager after a successful
key archival operation. See also
certificate.
authentication.
Data Recovery Manager transport
subject
Need help?
Do you have a question about the CERTIFICATE SYSTEM 8.0 - ADMINISTRATION and is the answer not in the manual?
Questions and answers