Site MapHelpFeedbackChapter Summary
Chapter Summary
(See related pages)

  • PKIs form the central management functionality used to enable encryption technologies.


  • PKI solutions include Certificate Authorities (CA) and Registration Authorities (RA).


  • RAs verify identities to be used on certificates.


  • CAs create certificates for identified entities and maintain records of their issuance and revocation.


  • Certificates are handled via a certificate server and client software.


  • Three classes of certificates exist


    • Class 1 personal e-mail use


    • Class 2 software signing


    • Class 3 used to set up a CA


  • There are three different architectures of CAs: hierarchical, peer-to-peer, and hybrid.









Security+ and BeyondOnline Learning Center

Home > Chapter 6 > Chapter Summary