Introduction to PKI···································································································································1-1
Architecture of PKI···························································································································1-2
Applications of PKI ··························································································································1-3
Operation of PKI ······························································································································1-3
PKI Configuration Task List ····················································································································1-4
Configuring a PKI Domain ······················································································································1-6
PKI Configuration Examples ·················································································································1-13
Failed to Retrieve CRLs ················································································································1-20
Table of Contents
i