PKI Fundamentals
  • What is Public Key  Infrastructure?
  • Components of a PKI
  • What is a Digital Certificate?
  • What is Encryption?
  • General Operation
    • The subscriber submits two forms of identification in person to the RA, LRA, or Notary Public depending on what the PKI policy requirements consist of.
    • Once the users credentials have been verified, the LRA securely registers the subscriber into the proper CA. At this time the RA issues the subscriber a one-time password.
    • User authenticates to the appropriate CA using the one-time password. The public and private keys are generated. A request is sent using the public key to generate the certificate.
    • The certificate is then posted to the directory and is returned to the subscriber.
    • The subscriber then puts the certificate onto a token (floppy disk, smart card, PC card).