subordinate CA A certificate authority whose certificate is signed by another
subordinate CA or by the root CA. See CA certificate, root CA.
symmetric encryption An encryption method that uses the same cryptographic
key to encrypt and decrypt a given message.
tamper detection A mechanism ensuring that data received in electronic form
has not been tampered with; that is, that the data received entirely corresponds
with the original version of the same data.
token A hardware or software device that is associated with a slot in a PKCS #11
module. It provides cryptographic services and optionally stores certificates and
keys.
tree hierarchy The hierarchical structure of an LDAP directory.
trust Confident reliance on a person or other entity. In a public-key infrastructure
(PKI), trust refers to the relationship between the user of a certificate and the
certificate authority (CA) that issued the certificate. If you trust a CA, you can
generally trust valid certificates issued by that CA.
virtual private network (VPN) A way of connecting geographically distant
divisions of an enterprise. The VPN allows the divisions to communicate over an
encrypted channel, allowing authenticated, confidential transactions that would
normally be restricted to a private network.
Glossary
829
Need help?
Do you have a question about the NETSCAPE MANAGEMENT SYSTEM 6.0 and is the answer not in the manual?
Questions and answers