![Red Hat CERTIFICATE 7.1 ADMINISTRATOR Скачать руководство пользователя страница 123](http://html.mh-extra.com/html/red-hat/certificate-7-1-administrator/certificate-7-1-administrator_administrators-manual_1427416123.webp)
How The Certificate Manager Works
Chapter 3
Certificate Manager
123
•
The end entity may have to provide some form of authentication before submitting the
request. You can configure LDAP authentication, Pin-based authentication, or
certificate-based authentication.
•
The request may be submitted using an agent-approved enrollment process or an
automated process.
❍
The agent-approved process, which involves no end-entity authentication, sends
the request to the request queue in the agent services interface where an agent must
processes the request. An agent can then change the status of the request, reject the
request, or approve the request. The agent can also change some aspects of the
request.
You can set up an automated notification that send an email any time a request
appears in the queue to the agent, or an automated job that sends a list of the
contents of the queue to agents on a pre configured schedule. See Chapter 13,
“Automated Notifications” and Chapter 14, “Automated Jobs.”
❍
The automated process, which involves end-entity authentication, allows the
certificate to be processed upon successful authentication of the end entity.
•
The form can collect information about the end entity from an LDAP directory when
the form is submitting. You can set up policies using predicates that request this
information from the LDAP directory when the user authenticates using an LDAP user
ID and password. For certificate profile based enrollment, you set up defaults that are
used to collect this information.
•
The policies or certificate profile associated with the form determine aspects of the
certificate that is issued. Depending on the policies or certificate profile that are
associated with the form, the request is evaluated against these to determine if the
request meets the constraints set, if the required information is provided, and what the
resultant certificate will contain.
•
The form can also request the export of the private encryption key from the user. If the
Data Recovery Manager subsystem is set up with this CA, the end entities key is
requested, and an archival request is sent to the Data Recovery Manager. This process
generally takes place in the background requiring no interaction from the end entity.
•
The certificate request is either rejected at some point in the process either by an agent,
or because it did not meet the policy, certificate profile, or authentication requirements,
or a certificate is issued.
•
The certificate is delivered to the end entity.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...