
Glossary
821
end entity
In a public-key infrastructure (PKI), a person, router, server, or other entity
that uses a certificate to identify itself.
extensions field
See certificate extensions.
Federal Bridge Certificate Authority (FBCA)
A configuration where two CAs form a
circle of trust by issuing cross-pair certificates to each other, and storing the two cross-pair
certificates as a certificate pair.
fingerprint
See certificate fingerprint.
FIPS PUBS 140-1
Federal Information Standards Publications (FIPS PUBS) 140-1 is a
US government standard for implementations of cryptographic modules--that is, hardware
or software that encrypts and decrypts data or performs other cryptographic operations
(such as creating or verifying digital signatures). Many products sold to the US government
must comply with one or more of the FIPS standards. See
http://www.itl.nist.gov/div897/pubs/fip140-1.htm
.
firewall
A system or combination of systems that enforces a boundary between two or
more networks.
impersonation
The act of posing as the intended recipient of information sent over a
network. Impersonation can take two forms: spoofing and misrepresentation.
input
In the context of the certificate profile feature, it defines the enrollment form for a
particular certificate profile. You set up each input, which then dynamically creates the
enrollment form from all inputs configured for this enrollment.
intermediate CA
A CA whose certificate is located between the root CA and the issued
certificate in a certificate chain.
IP spoofing
The forgery of client IP addresses.
JAR file
A digital envelope for a compressed collection of files organized according to
the Java archive (JAR) format.
Java archive (JAR) format
A set of conventions for associating digital signatures,
installer scripts, and other information with files in a directory.
Java Cryptography Architecture (JCA)
The API specification and reference developed
by Sun Microsystems for cryptographic services. See
http://java.sun.com/products/jdk/1.2/docs/guide/security/CryptoSpec
.html#Introduction
.
Summary of Contents for CERTIFICATE 7.1 ADMINISTRATOR
Page 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Page 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...