Chapter 12. PKI Operational Considerations

To operate a PKI successfully, you must take into consideration a number of requirements, characteristics, and options. This chapter defines PKI operational considerations as those practices, components, or facilities necessary for the PKI to function (these do not include, for example, explicit PKI operations themselves). In general, such operational considerations are sufficiently fundamental to the overall architecture that concrete decisions must be made and explicit actions must be taken in advance of PKI deployment.

This chapter discusses a number of these operational considerations, including client-side software, on-line requirements, physical security, hardware components, user key compromise, ...

Get Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.