Glossary
522
single sign-on
1. In Certificate System, a password that simplifies the way to sign
on to Red Hat Certificate System by storing the passwords for
the internal database and tokens. Each time a user logs on, he is
required to enter this single password.
2. The ability for a user to log in once to a single computer and be
authenticated automatically by a variety of servers within a network.
Partial single sign-on solutions can take many forms, including
mechanisms for automatically tracking passwords used with different
servers. Certificates support single sign-on within a
public-key
infrastructure (PKI)
. A user can log in once to a local client's private-
key database and, as long as the client software is running, rely
on
certificate-based authentication
to access each server within an
organization that the user is allowed to access.
slot
The portion of a
PKCS #11 module
, implemented in either hardware
or software, that contains a
token
.
smart card
A small device that contains a microprocessor and stores
cryptographic information, such as keys and certificates, and
performs cryptographic operations. Smart cards implement some or
all of the
PKCS #11
interface.
spoofing
Pretending to be someone else. For example, a person can pretend
to have the email address
, or a computer
can identify itself as a site called
www.redhat.com
when it is not.
Spoofing is one form of
impersonation
. See also
misrepresentation
.
SSL
See
Secure Sockets Layer (SSL)
.
subject
The entity identified by a
certificate
. In particular, the subject field
of a certificate contains a
subject name
that uniquely describes the
certified entity.
subject name
A
distinguished name (DN)
that uniquely describes the
subject
of a
certificate
.
subordinate CA
A certificate authority that's certificate is signed by another
subordinate CA or by the root CA. See
CA certificate
,
root CA
.
symmetric encryption
An encryption method that uses the same cryptographic key to
encrypt and decrypt a given message.
T
tamper detection
A mechanism ensuring that data received in electronic form entirely
corresponds with the original version of the same data.
token
A hardware or software device that is associated with a
slot
in a
PKCS #11 module
. It provides cryptographic services and optionally
stores certificates and keys.
tree hierarchy
The hierarchical structure of an LDAP directory.
Summary of Contents for CERTIFICATE SYSTEM 7.3 - ADMINISTRATION
Page 15: ...xv Index 525 ...
Page 16: ...xvi ...
Page 38: ...Chapter 1 Overview 16 Figure 1 4 Certificate System Architecture ...
Page 82: ...Chapter 2 Installation and Configuration 60 rpm ev rhpki manage ...
Page 154: ...132 ...
Page 194: ...172 ...
Page 238: ...216 ...
Page 244: ...222 ...
Page 246: ...224 ...
Page 286: ...264 ...
Page 292: ...270 ...
Page 318: ...Chapter 13 Certificate Profiles 296 Parameter IssuerType_n IssuerName_n ...
Page 321: ...Freshest CRL Extension Default 299 Parameter PointName_n PointIssuerName_n ...
Page 398: ...376 ...
Page 412: ...390 ...
Page 472: ...450 ...
Page 506: ...484 ...
Page 528: ...506 ...
Page 546: ...524 ...