Chapter Summary

In this chapter, we examined the concept of the public key infrastructure and the functions it enables. We began the chapter with a discussion of the digital certificate and the policies and procedures required to support it. We then looked at the concept of trust and how it relates to PKI in the form of trust models. We also talked about one of the most challenging portions of a PKI operation: cross certification.

KEY TERMS

  • Attribute certificate

  • Authenticated header (AH)

  • CA bridges

  • Centralized key management

  • Certificate Enrollment Protocol (CEP)

  • Certificate Management Protocol (CMP)

  • Certificate practice statement

  • Certificate policy

  • Certificate revocation

  • Certificate revocation list

  • Certificate suspension

  • Cross certification

  • Cryptographic ...

Get Security+ Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.