
17
Managing X.509 Certification
An increasing number of authentication mechanisms are based on cryptographic proce-
dures. Digital certificates that assign cryptographic keys to their owners play an important
role in this context. These certificates are used for communication and can also be
found, for example, on company ID cards. The generation and administration of certifi-
cates is mostly handled by official institutions that offer this as a commercial service.
In some cases, however, it may make sense to carry out these tasks yourself, for example,
if a company does not wish to pass personal data to third parties.
YaST provides two modules for certification, which offer basic management functions
for digital X.509 certificates. The following sections explain the basics of digital certi-
fication and how to use YaST to create and administer certificates of this type. For more
detailed information, refer to
http://www.ietf.org/html.charters/
pkix-charter.html
.
17.1 The Principles of Digital
Certification
Digital certification uses cryptographic processes to encrypt data, protecting the data
from access by unauthorized people. The user data is encrypted using a second data
record, or key. The key is applied to the user data in a mathematical process, producing
an altered data record in which the original content can no longer be identified. Asym-
metrical encryption is now in general use (public key method). Keys always occur in
pairs:
Managing X.509 Certification
197
Summary of Contents for LINUX ENTERPRISE DESKTOP 11
Page 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Page 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Page 10: ......
Page 29: ...Part I Authentication...
Page 30: ......
Page 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Page 126: ......
Page 127: ...Part II Local Security...
Page 128: ......
Page 158: ......
Page 173: ...Part III Network Security...
Page 174: ......
Page 194: ......
Page 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Page 210: ......
Page 228: ......
Page 229: ...Part IV Confining Privileges with Novell AppArmor...
Page 230: ......
Page 274: ......
Page 300: ......
Page 328: ......
Page 340: ......
Page 342: ......
Page 386: ......
Page 387: ...Part V The Linux Audit Framework...
Page 388: ......