519
is really a site that takes credit-card payments but never sends any
goods. Misrepresentation is one form of
impersonation
. See also
spoofing
.
N
Netscape Security Services
(NSS)
A set of libraries designed to support cross-platform development
of security-enabled communications applications. Applications built
using the NSS libraries support the
Secure Sockets Layer (SSL)
protocol for authentication, tamper detection, and encryption, and the
PKCS #11 protocol for cryptographic token interfaces. NSS is also
available separately as a software development kit.
nonrepudiation
The inability by the sender of a message to deny having sent the
message. A
digital signature
provides one form of nonrepudiation.
O
object signing
A technology that allows software developers to sign Java
™
code,
JavaScript scripts, or any kind of file and allows users to identify the
signers and control access by signed code to local system resources.
object-signing certificate
A certificate that's associated private key is used to sign objects using
the technology known as
object signing
.
OCSP
Online Certificate Status Protocol.
one-way hash
1. A number of fixed-length generated from data of arbitrary length
with the aid of a hashing algorithm. The number, also called a
message digest, is unique to the hashed data. Any change in the
data, even deleting or altering a single character, results in a different
value.
2. The content of the hashed data cannot be deduced from the hash.
operation
The specific operation, such as read or write, that is being allowed or
denied in an access control instruction.
output
In the context of the certificate profile feature, it defines the resulting
form from a successful certificate enrollment for a particular certificate
profile. Each output is set, which then dynamically creates the form
from all outputs configured for this enrollment.
P
password-based
authentication
Confident identification by means of a name and password. See also
authentication
,
certificate-based authentication
.
PKCS #7
The public-key cryptography standard that governs signing and
encryption.
PKCS #10
The public-key cryptography standard that governs certificate
requests.
Summary of Contents for CERTIFICATE SYSTEM 7.3 - ADMINISTRATION
Page 15: ...xv Index 525 ...
Page 16: ...xvi ...
Page 38: ...Chapter 1 Overview 16 Figure 1 4 Certificate System Architecture ...
Page 82: ...Chapter 2 Installation and Configuration 60 rpm ev rhpki manage ...
Page 154: ...132 ...
Page 194: ...172 ...
Page 238: ...216 ...
Page 244: ...222 ...
Page 246: ...224 ...
Page 286: ...264 ...
Page 292: ...270 ...
Page 318: ...Chapter 13 Certificate Profiles 296 Parameter IssuerType_n IssuerName_n ...
Page 321: ...Freshest CRL Extension Default 299 Parameter PointName_n PointIssuerName_n ...
Page 398: ...376 ...
Page 412: ...390 ...
Page 472: ...450 ...
Page 506: ...484 ...
Page 528: ...506 ...
Page 546: ...524 ...