Novell LINUX ENTERPRISE DESKTOP 11 - APPLICATION GUIDE 17-03-2009 Application Manual page 130

Hide thumbs Also See for LINUX ENTERPRISE DESKTOP 11 - APPLICATION GUIDE 17-03-2009:
Table of Contents

Advertisement

Specifies the length, in bits, of the key. The longer the key, the
Strength:
more security it provides. However, a long key will not compensate for the use
of a weak passphrase.
A unique string of characters that exactly identifies a key.
Fingerprint:
Created:
The date the key was created.
The date the key can no longer be used (a key can no longer be used
Expires:
to perform key operations after it has expired). Changing a key's expiration date
to a point in the future re-enables it. A good general practice is to have a master
key that never expires and multiple subkeys that do expire and are signed by the
master key.
Here you can set the level of trust in the owner of
Overide Owner Trust:
the key. Trust is an indication of how sure you are of a person's ability to correctly
extend the web of trust. When you are faced with a key you have not signed, the
validity of that person's key will be determined based on the signatures they have
collected and how well or not you trust the people who have made those signa-
tures.
Subkeys:
See
Section "Editing OpenPGP Subkey Properties"
(page 117) for
more information.
6 Click Close.
116
Application Guide

Advertisement

Table of Contents

Troubleshooting

loading
Need help?

Need help?

Do you have a question about the LINUX ENTERPRISE DESKTOP 11 - APPLICATION GUIDE 17-03-2009 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Suse linux enterprise desktop 11

Table of Contents