05.01.2013 Views

Mac OS X Leopard - ARCAism

Mac OS X Leopard - ARCAism

Mac OS X Leopard - ARCAism

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

144<br />

CHAPTER 8 LEOPARD SECURITY<br />

• The key in the keychain is valid and unexpired. While this usually isn’t a big problem for<br />

passwords, security certificates and encryption keys, which are also stored in the keychain,<br />

will often expire.<br />

The keychain data itself is stored in a file in your ~/Library/Keychains folder. All sensitive<br />

data is well encrypted within the file. Should you ever need to view your keychain (or other keychains<br />

you have access to), <strong>Leopard</strong> includes the Keychain Access utility (in the /Applications/<br />

Utilities folder). The Keychain Access utility (Figure 8-1) provides a way for you to view, edit,<br />

and configure individual entries stored in your keychain.<br />

Figure 8-1. The Keychain Access utility provides a way to view and alter your keychain items.<br />

The Keychain Access utility provides a column on the left where you can select the keychain<br />

you’d like to view (any available keychains will be listed there; your default keychain is the login<br />

keychain). Below the list of keychains is a list of categories of items that are stored in the keychain.<br />

The categories and their descriptions are covered in Table 8-1. On the right side is the<br />

view area, where, at the bottom, the individual items stored in the keychain are listed. Above<br />

that is a view that provides some basic information about the selected item.<br />

Table 8-1. Categories of Items Stored in Your Keychain<br />

Category Description<br />

Passwords These are your passwords, which are broken into three subcategories:<br />

AppleShare: These are your passwords associated with file servers and other<br />

people’s computers that you have accounts on.<br />

Application: These passwords are associated with specific applications. They can be<br />

used for just about anything, including Internet sites, but rather than being<br />

associated with the site they are associated with the application.<br />

Internet: These are your Internet passwords, which include certain web site login<br />

information, as well as mail accounts and other Internet server credentials.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!