Adobe 22002486 User Manual page 31

For acrobat 9.0 and adobe reader 9.0
Table of Contents

Advertisement

Acrobat 9 Family of Products
Security Feature User Guide
security workflows must share their certificates ahead of time. Both operations involve importing other
people's certificates into your Trusted Identities list. When a person's certificate information appears in the
Trusted Identity Manager, they become a trusted identity.
Groups of people that share documents with certificate security or digital signatures are in essence a
community of trusted identities that share their certificates to make those features work. You will add
people to your trusted identity list and others will add you to theirs:
When you sign document, the document recipient can validate your signature by validating the
certificate embedded in the document. Conversely, you need access to a document sender's certificate
to validate their signature.
You encrypt a document with the document recipient's public key so that they can decrypt it with their
corresponding private key. Conversely, others need your certificate to encrypt documents for you.
The Acrobat family of products provide tools for selecting and interacting with the certificates of
document recipients you trust. For example, Acrobat's user interface prompts authors to select one or
more recipients when applying certificate security. Because it is often the case that a document will be
sent or received from numerous individuals, it is expedient to create a list of trusted identities ahead of
time. In large organizations, an administrator may do this for you; otherwise, you will use Acrobat's Trusted
Identity Manager to store your trusted identities' contact information and certificates.
Getting someone's contact information and certificate involves searching for (or having sent to you) the
digital ID data in the requisite format. Some common ways of getting the data include the following:
Import the data from an .acrobatsecurity file. Configuration details can be imported from a security
settings file as described in
Extract the data from an FDF file. Double-clicking on an FDF file causes Acrobat to automatically
import the information.
Search a server directory. Users can add directory servers containing contact information and
certificates. Sometimes administrators preconfigure these directories.
Use the data embedded in a signed document. The Certificate Viewer's Add to Trusted Identities
button adds a certificate to the trusted identities list and allows setting its trust level.
"Migrating and Sharing Security Settings" on page
Managing Certificate Trust and Trusted Identities
What is a Trusted Identity?
149.
31

Advertisement

Table of Contents
loading

This manual is also suitable for:

Digital signature

Table of Contents