H3c-technologies H3C WX6000 Series Access Controllers Uživatelský manuál Strana 648

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 678
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 647
68-1
68 PKI Configuration
When configuring PKI, go to these sections for information you are interested in:
z Introduction to PKI
z PKI Configuration Task List
z Displaying and Maintaining PKI
z PKI Configuration Examples
z Troubleshooting PKI
The term switch in this document refers to a switch in a generic sense or an access controller
configured with the switching function unless otherwise specified.
Introduction to PKI
This section covers these topics:
z PKI Overview
z PKI Terms
z Architecture of PKI
z Applications of PKI
z Operation of PKI
PKI Overview
Public Key Infrastructure (PKI) is a system designed for providing information security through public
key technologies and digital certificates and verifying the identities of the digital certificate owners.
PKI employs digital certificates, which are bindings of certificate owner identity information and public
keys. PKI allows users to request certificates, use certificates, and revoke certificates. By leveraging
digital certificates and relevant services like certificate distribution and blacklist publication, PKI
supports authentication the entities involved in communication, and thus guaranteeing the
confidentiality, integrity and non-repudiation of data.
PKI Terms
Digital certificate
A digital certificate is a file signed by a certificate authority (CA) that contains a public key and the
related user identity information. A simplest digital certificate contains a public key, an entity name, and
a digital signature from the CA. Generally, a digital certificate also includes the validity period of the key,
Zobrazit stránku 647
1 2 ... 643 644 645 646 647 648 649 650 651 652 653 ... 677 678

Komentáře k této Příručce

Žádné komentáře