22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

236 Lotus Security Handbook<br />

common access protocol, the Lightweight Directory Access Protocol (LDAP), of<br />

which the latest version is LDAP v3.<br />

LDAP is the most efficient and most widely accepted method for an End-Entity or<br />

a CA to retrieve or modify the certificate and CRL information stored in a CR.<br />

LDAP offers commands or procedures which do this efficiently and seamlessly,<br />

such as: bind, search or modify, and unbind. As well, the attributes and object<br />

classes to be supported by an LDAP server acting as server of a CR are defined,<br />

and are called Schemas.<br />

There are alternative methods for obtaining certificates or CRL information if a<br />

CR is not implemented in a directory. However, these are not recommended and<br />

after considering the requirements that a CR must meet, it turns out that a<br />

Directory is actually the best place to store CR information. Such requirements<br />

include: easy accessibility, standards-based access, up-to-date information<br />

storage, built-in security (if required), data management issues and the possible<br />

merging of similar data. In the case of a Domino-based Internet PKI, the CR is<br />

the Domino Directory.<br />

The Registration Authority (RA)<br />

The Registration Authority (RA) is an optional component in a PKI. In some<br />

cases, the CA incorporates the role of an RA. Where a separate RA is used, the<br />

RA is a trusted End-Entity certified by the CA, acting as a subordinate server of<br />

the CA. The CA can delegate some of its management functions to the RA. For<br />

example, the RA may perform personal authentication tasks, report revoked<br />

certificates, generate keys, or archive key pairs. The RA, however, does not<br />

issue certificates or CRLs.<br />

6.2.3 X.509 certificates<br />

A crucial part of a PKI – and one worthy of its own section – is the X.509<br />

certificate.<br />

While there have been several proposed formats for public key certificates, most<br />

commercial certificates available today are based on the international standard<br />

ITU-T Recommendation X.509 (formerly CCITT X.509).<br />

X.509 certificates are commonly used in secure Internet protocols, such as those<br />

that we <strong>cover</strong> in the present chapter, namely:<br />

► Secure Sockets Layer<br />

► Secure Multipurpose Internet Message Extension (S/MIME)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!