What is eToken Enterprise? - tlk
What is eToken Enterprise? - tlk
What is eToken Enterprise? - tlk
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Note<br />
Whenever you receive a digitally signed message, you can store the<br />
sender’s certificate and public key in your email address book. You<br />
can also search the growing l<strong>is</strong>t of online directories that contain<br />
public keys and certificates, retrieve these items and use them to send<br />
encrypted email.<br />
When a certificate <strong>is</strong> <strong>is</strong>sued, it <strong>is</strong> linked to the current user name and<br />
the email address that you specified during the certificate request<br />
process. If you log in with a different user name, you will not be able<br />
to access the certificate. To use the certificate on a different computer,<br />
you must have the same email address set up on it, and you must be<br />
logged in with the same user name.<br />
CA Types and Hierarchies<br />
An organization can establ<strong>is</strong>h its own CA structure to support its<br />
digital security requirements, using Microsoft CA in Windows 2000,<br />
or other certificate services providers.<br />
Standalone and Enterpr<strong>is</strong>e CAs<br />
A CA can be configured as a standalone CA or an enterpr<strong>is</strong>e CA:<br />
Standalone CA: A trusted third-party entity that <strong>is</strong>sues and<br />
revokes certificates for all an organization’s users. Th<strong>is</strong> can be a<br />
commercial CA, such as VeriSign, or any other body that <strong>is</strong> trusted<br />
and provides similar services.<br />
Using a standalone CA provides users with a means of secure<br />
communication within the organization and with those outside it,<br />
but does not enable an organization to control its own certificate<br />
<strong>is</strong>suing and management policy.<br />
Enterpr<strong>is</strong>e CA: An organization can set up its own enterpr<strong>is</strong>e CA<br />
to meet its specific business requirements, enabling it to control the<br />
<strong>is</strong>suing and revoking of certificates for its users.<br />
An enterpr<strong>is</strong>e CA <strong>is</strong> an ideal framework for controlling access to<br />
internal resources or functions within an organization. By <strong>is</strong>suing<br />
certificates to selected personnel, for example, a company can<br />
ensure that certain goods and services are ordered only by<br />
authorized employees.<br />
18 Security Concepts