subject
subject name
subordinate CA
symmetric encryption
T
tamper detection
token
tree hierarchy
trust
V
virtual private network
(VPN)
The entity identified by a certificate. In particular, the subject field
of a certificate contains a
certified entity.
distinguished name (DN)
A
certificate.
A certificate authority that's certificate is signed by another
subordinate CA or by the root CA. See
An encryption method that uses the same cryptographic key to
encrypt and decrypt a given message.
A mechanism ensuring that data received in electronic form entirely
corresponds with the original version of the same data.
A hardware or software device that is associated with a
PKCS #11
module. It provides cryptographic services and optionally
stores certificates and keys.
The hierarchical structure of an LDAP directory.
Confident reliance on a person or other entity. In a
infrastructure
(PKI), trust refers to the relationship between the
user of a certificate and the
certificate. If a CA is trusted, then valid certificates issued by that CA
can be trusted.
A way of connecting geographically distant divisions of an enterprise.
The VPN allows the divisions to communicate over an encrypted
channel, allowing authenticated, confidential transactions that would
normally be restricted to a private network.
subject name
that uniquely describes the
that uniquely describes the
CA
certificate,
certificate authority (CA)
subject
of a
root
CA.
slot
in a
public-key
that issued the
533
Need help?
Do you have a question about the CERTIFICATE SYSTEM 8.0 - ADMINISTRATION and is the answer not in the manual?