30.11.2012 Views

What is eToken Enterprise? - tlk

What is eToken Enterprise? - tlk

What is eToken Enterprise? - tlk

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Note<br />

Whenever you receive a digitally signed message, you can store the<br />

sender’s certificate and public key in your email address book. You<br />

can also search the growing l<strong>is</strong>t of online directories that contain<br />

public keys and certificates, retrieve these items and use them to send<br />

encrypted email.<br />

When a certificate <strong>is</strong> <strong>is</strong>sued, it <strong>is</strong> linked to the current user name and<br />

the email address that you specified during the certificate request<br />

process. If you log in with a different user name, you will not be able<br />

to access the certificate. To use the certificate on a different computer,<br />

you must have the same email address set up on it, and you must be<br />

logged in with the same user name.<br />

CA Types and Hierarchies<br />

An organization can establ<strong>is</strong>h its own CA structure to support its<br />

digital security requirements, using Microsoft CA in Windows 2000,<br />

or other certificate services providers.<br />

Standalone and Enterpr<strong>is</strong>e CAs<br />

A CA can be configured as a standalone CA or an enterpr<strong>is</strong>e CA:<br />

Standalone CA: A trusted third-party entity that <strong>is</strong>sues and<br />

revokes certificates for all an organization’s users. Th<strong>is</strong> can be a<br />

commercial CA, such as VeriSign, or any other body that <strong>is</strong> trusted<br />

and provides similar services.<br />

Using a standalone CA provides users with a means of secure<br />

communication within the organization and with those outside it,<br />

but does not enable an organization to control its own certificate<br />

<strong>is</strong>suing and management policy.<br />

Enterpr<strong>is</strong>e CA: An organization can set up its own enterpr<strong>is</strong>e CA<br />

to meet its specific business requirements, enabling it to control the<br />

<strong>is</strong>suing and revoking of certificates for its users.<br />

An enterpr<strong>is</strong>e CA <strong>is</strong> an ideal framework for controlling access to<br />

internal resources or functions within an organization. By <strong>is</strong>suing<br />

certificates to selected personnel, for example, a company can<br />

ensure that certain goods and services are ordered only by<br />

authorized employees.<br />

18 Security Concepts

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!