Security

cv Act PKIntegrated - The Ideal PKI Solution for Novell eDirectory Environments

Date Added: Aug 2009
Format: PDF

The term Public Key Infrastructure (PKI) comprises the entirety of the hardware, software and the organizational stipulations required for the appropriate use of encryption and related technologies in a larger user group. The PKI-technology is based on Public Key cryptography, in which every user receives a public and a private key. The public key is generally accessible and is used for encryption as well as for verifying a digital signature. The private key is secret and used for decryption as well as producing a digital signature.