Security

cv Act PKIntegrated - The Ideal PKI Solution for Novell eDirectory Environments

Free registration required

Executive Summary

The term Public Key Infrastructure (PKI) comprises the entirety of the hardware, software and the organizational stipulations required for the appropriate use of encryption and related technologies in a larger user group. The PKI-technology is based on Public Key cryptography, in which every user receives a public and a private key. The public key is generally accessible and is used for encryption as well as for verifying a digital signature. The private key is secret and used for decryption as well as producing a digital signature.

  • Format: PDF
  • Size: 526.9 KB