|
Table 10-4 shows how public key cryptography relates to file system and eDirectory security
|
bet | 13/19 | Sana | 21.03.2017 | Hajmi | 52,46 Kb. | | #816 |
Table 10-4 shows how public key cryptography relates to file system and eDirectory security Public key cryptography provides both authentication and encryption security through the use of mathematically related sets of digital codes called key pairs The private key is kept solely by the owner of the key pair and used to create digital signatures and encrypt and decrypt data The public key is made available to all network users and used by outside entities to encrypt data sent to the key pair owner Public key certificates contain, at a minimum, the entity’s public key, a subject name, and a CA-generated digital signature Public key certificates generated by most commercial CAs use the X.509v3 format and contain the following information: The name of the user or organization (subject name)
|
| |