22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

274 Lotus Security Handbook<br />

Interoperability with other S/MIME-compliant software<br />

The PKCS #12 standard specifies the format for certificate export and import.<br />

This permits the users, among other things, to make backup copies of their<br />

private key. Also, if the user needs to send S/MIME e-mails from a different<br />

machine or from a different messaging client that provides S/MIME functionality,<br />

this provides a simple way for them to take their public/private key pair with them<br />

and install it in the new messaging client.<br />

Thus, the purpose of the PKCS #12 standard is to provide interoperability of the<br />

private/public key pair and certificates with other S/MIME-capable messaging<br />

clients. This is quite important, since otherwise, if a user requested a certificate<br />

with Internet Explorer from a Web CA like VeriSign, that user would only be able<br />

to use it in conjunction with Outlook Express. Similarly, if a user requested a<br />

certificate with Netscape Navigator, that user would only be able to use it in<br />

conjunction with Netscape Messenger.<br />

Obtaining a client certificate for S/MIME<br />

For a client to be able to send signed and encrypted e-mails using S/MIME, it is<br />

necessary to have an X.509 certificate for it to use. The current generation of<br />

S/MIME-capable messaging clients provide the ability to generate a certificate<br />

request with a Web-based CA. Once a client certificate has been requested (and<br />

approved), it is installed in the S/MIME-capable messaging client so that the<br />

client can sign and encrypt any e-mail messages.<br />

It is also necessary to make the user’s certificate available to anybody who wants<br />

to send encrypted e-mails to that user. Encrypted e-mail messages addressed to<br />

the user are encrypted with that user’s public key.<br />

Figure 6-28 on page 275 is a high-level representation of the process of<br />

requesting and acquiring certificates, as well as sending signed and encrypted<br />

e-mails, as implemented in the current generation of SMIME-capable messaging<br />

clients.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!