22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 6-17 PKI Components<br />

234 Lotus Security Handbook<br />

As an alternative, a CA can generate a client’s key pair and, subsequently, the<br />

signed certificate for that client. This process, however, is seldom implemented<br />

because the private key needs to be forwarded from the CA to the client, which<br />

can be a weak link. It is generally considered more secure when the clients<br />

generate their own key pairs, in which case the private keys never leave their<br />

area of authority.<br />

In order for a public key infrastructure to work completely, the basic assumption<br />

is that any party who wishes to verify a certificate must trust its digital signer CA.<br />

In the PKI, “A trusts B” means that “A trusts the CA that signed B’s certificate.”<br />

Thus, in general terms, “A trusts CA” means that “A” holds a copy of the CA’s<br />

certificate locally.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!