
Acrobat 9 Family of Products
Glossary of Security Terms
Security Feature User Guide
180
MSCAPI
Windows Microsoft Crypto API (MSCAPI) is the API that the application uses to access cryptographic
service providers such as PFX files and PKCS#11 files. MSCAPI is also used by the application anytime it
uses a Windows security feature.
OCSP
See Online Certificate Status Protocol.
Online Certificate Status
Protocol (OCSP)
OCSP defines a protocol for determining the revocation status of a digital certificate without requiring a
CRL. Unlike CRL, OCSP obviates the need to frequently download updates to keep certification status
lists current. Acrobat’s OCSP revocation checker adheres to RFC 2560.
organization digital ID, desktop
A digital ID issued to an organization or non-human entity (for example, the Adobe Public Relations
Department). It can be used by an authorized employee to perform signing operations, at the desktop,
on behalf of the company.
organization digital ID, server
A digital ID issued on behalf of an organization or non-human entity (e.g. Adobe Public Relations
Department, Cisco Corporation, etc.) for performing server-based, automated signing operations.
PKCS
A
group of Public Key Cryptography Standards authored by RSA Security
PKCS#11 device
External hardware such as a smart card reader or token. It is driven by a module (a software driver such
as a .dll file on Windows).
PKCS#11 digital ID
An ID on a PKCS# device. A device may contain one or more IDs.
PKCS#11 format
Cryptographic Token Interface Standard: An encryption format used by smart cards, tokens, and other
PKCS#11-compatible devices. The ID is stored on the device rather than on the user’s computer.
PKCS#11 module
The software module that drives a PKCS#11 device.
PKCS#11 token
See PKCS#11 device.
PKCS#12
Personal Information Exchange Syntax Standard: Specifies a portable, password protected, and
encrypted format for storing or transporting certificates. The certificates are stored in .pfx (Windows)
and .p12 (Macintosh) files. Unlike other formats, the file may contain private keys.
PKCS#7
Certificate Message Syntax (CMS): Files with .p7b and .p7c extensions are registered by the Windows OS.
If you double click on a .p7c file it will be viewed by a Windows application.
Policy Server
As of Acrobat 9, Adobe Policy Server is renamed to Adobe LiveCycle Rights Management Server
privileged context
A context in which you have the right to do something that’s normally restricted. Such a right (or
privilege) could be granted by executing a method in a specific way (through the console or batch
process), by some PDF property, or because the document was signed by someone you trust. For
example, trusting a document certifier’s certificate for executing JavaScript creates a privileged context
which enables the JavaScript to run where it otherwise would not.
qualified certificates
A qualified certificate that conforms to the RFC 3739 specification. It contains a qc statement that simply
states that it is a qualified certificate. These types of certificates meet the requirements of the German
digital signature law, and most qualified certificates currently originate from German trust centers.
qualified electronic signatures
Electronic signatures that use a qualified certificate valid at the time of their creation and that have been
produced with a secure signature-creation device.
roaming ID
A roaming ID is a digital ID that is stored on a server. The private key always remains on the server, but
the certificate and its public key can be downloaded at the subscriber’s request to any location. Roaming
IDs require an Internet connection.
root certificate
The top-most issuing certificate in a certificate chain. It is sometimes used as a trust anchor.
secure signature-creation
devices
(SSCD) Software or hardware products used to store and apply signature code and that are designed for
qualified electronic signatures
security restricted property or
method
A property or method whose availability is restricted to certain events such as batch processing, console
execution, or application startup. For example, in Acrobat 7.0, a security-restricted method (S) can only
be executed through a menu event if one of the following is true: The JavaScript user preferences item
“Enable menu items JavaScript execution privileges” is checked or the method is executed through a
trusted function. The
JavaScript for Acrobat API Reference
identifies the items that have restrictions.
Table 5 Security Terms