511
Glossary
A
access control
The process of controlling what particular users are allowed to do. For
example, access control to servers is typically based on an identity,
established by a password or a certificate, and on rules regarding
what that entity can do. See also
access control list (ACL)
.
access control instructions
(ACI)
An access rule that specifies how subjects requesting access are
to be identified or what rights are allowed or denied for a particular
subject. See
access control list (ACL)
.
access control list (ACL)
A collection of access control entries that define a hierarchy of access
rules to be evaluated when a server receives a request for access to
a particular resource. See
access control instructions (ACI)
.
administrator
The person who installs and configures one or more Certificate
System managers and sets up privileged users, or agents, for them.
See also
agent
.
agent
A user who belongs to a group authorized to manage
agent services
for a Certificate System manager. See also
Certificate Manager
agent
,
Data Recovery Manager agent
.
agent-approved enrollment
An enrollment that requires an agent to approve the request before
the certificate is issued.
agent services
1. Services that can be administered by a Certificate System
agent
through HTML pages served by the Certificate System subsystem for
which the agent has been assigned the necessary privileges.
2. The HTML pages for administering such services.
attribute value assertion
(AVA)
An assertion of the form
attribute = value
, where
attribute
is a tag,
such as
o
(organization) or
uid
(user ID), and
value
is a value
such as "Red Hat, Inc." or a login name. AVAs are used to form the
distinguished name (DN)
that identifies the subject of a certificate,
called the
subject name
of the certificate.
audit log
A log that records various system events. This log can be signed,
providing proof that it was not tampered with, and can only be read by
an auditor user.
auditor
A privileged user who can view the signed audit logs.
authentication
Confident identification; assurance that a party to some computerized
transaction is not an impostor. Authentication typically involves
the use of a password, certificate, PIN, or other information to
validate identity over a computer network. See also
password-based
authentication
,
certificate-based authentication
,
client authentication
,
server authentication
.
Summary of Contents for CERTIFICATE SYSTEM 7.3 - ADMINISTRATION
Page 15: ...xv Index 525 ...
Page 16: ...xvi ...
Page 38: ...Chapter 1 Overview 16 Figure 1 4 Certificate System Architecture ...
Page 82: ...Chapter 2 Installation and Configuration 60 rpm ev rhpki manage ...
Page 154: ...132 ...
Page 194: ...172 ...
Page 238: ...216 ...
Page 244: ...222 ...
Page 246: ...224 ...
Page 286: ...264 ...
Page 292: ...270 ...
Page 318: ...Chapter 13 Certificate Profiles 296 Parameter IssuerType_n IssuerName_n ...
Page 321: ...Freshest CRL Extension Default 299 Parameter PointName_n PointIssuerName_n ...
Page 398: ...376 ...
Page 412: ...390 ...
Page 472: ...450 ...
Page 506: ...484 ...
Page 528: ...506 ...
Page 546: ...524 ...