|
|
|
PKI Fundamentals |
|
- What is Public Key Infrastructure?
- Components of a PKI
- What is a Digital Certificate?
- What is Encryption?
-
General Operation
- The subscriber submits two forms of identification in
person to the RA, LRA, or Notary Public depending on what
the PKI policy requirements consist of.
- Once the users credentials have been verified, the LRA
securely registers the subscriber into the proper CA. At
this time the RA issues the subscriber a one-time password.
- User authenticates to the appropriate CA using the
one-time password. The public and private keys are
generated. A request is sent using the public key to
generate the certificate.
- The certificate is then posted to the directory and is
returned to the subscriber.
- The subscriber then puts the certificate onto a token
(floppy disk, smart card, PC card).
|
|
|