
Glossary
482
single sign-on
1. In Certificate System, a password that simplifies the way to sign
on to Red Hat Certificate System by storing the passwords for
the internal database and tokens. Each time a user logs on, he is
required to enter this single password.
2. The ability for a user to log in once to a single computer and be
authenticated automatically by a variety of servers within a network.
Partial single sign-on solutions can take many forms, including
mechanisms for automatically tracking passwords used with different
servers. Certificates support single sign-on within a
public-key
infrastructure (PKI)
. A user can log in once to a local client's private-
key database and, as long as the client software is running, rely
on
certificate-based authentication
to access each server within an
organization that the user is allowed to access.
slot
The portion of a
PKCS #11 module
, implemented in either hardware
or software, that contains a
token
.
smart card
A small device that contains a microprocessor and stores
cryptographic information, such as keys and certificates, and
performs cryptographic operations. Smart cards implement some or
all of the
PKCS #11
interface.
spoofing
Pretending to be someone else. For example, a person can pretend
to have the email address
, or a computer
can identify itself as a site called
www.redhat.com
when it is not.
Spoofing is one form of
impersonation
. See also
misrepresentation
.
SSL
See
Secure Sockets Layer (SSL)
.
subject
The entity identified by a
certificate
. In particular, the subject field
of a certificate contains a
subject name
that uniquely describes the
certified entity.
subject name
A
distinguished name (DN)
that uniquely describes the
subject
of a
certificate
.
subordinate CA
A certificate authority that's certificate is signed by another
subordinate CA or by the root CA. See
CA certificate
,
root CA
.
symmetric encryption
An encryption method that uses the same cryptographic key to
encrypt and decrypt a given message.
T
tamper detection
A mechanism ensuring that data received in electronic form entirely
corresponds with the original version of the same data.
token
A hardware or software device that is associated with a
slot
in a
PKCS #11 module
. It provides cryptographic services and optionally
stores certificates and keys.
tree hierarchy
The hierarchical structure of an LDAP directory.
Содержание CERTIFICATE SYSTEM 7.2 - MIGRATION GUIDE
Страница 36: ...Chapter 1 Overview 16 Figure 1 4 Certificate System Architecture ...
Страница 144: ...124 ...
Страница 160: ...140 ...
Страница 208: ...188 ...
Страница 210: ...190 ...
Страница 256: ...236 ...
Страница 282: ...Chapter 12 Certificate Profiles 262 Parameter IssuerName_n IssuerType_n ...
Страница 285: ...Freshest CRL Extension Default 265 Parameter PointName_n PointIssuerName_n ...
Страница 335: ...Configuring Mappers 315 Figure 14 9 Selecting a New Mapper Type 6 Edit the mapper instance and click OK ...
Страница 362: ...342 ...
Страница 376: ...356 ...
Страница 436: ...416 ...
Страница 490: ...470 ...
Страница 504: ...484 ...