05.01.2013 Views

Mac OS X Leopard - ARCAism

Mac OS X Leopard - ARCAism

Mac OS X Leopard - ARCAism

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

146<br />

CHAPTER 8 LEOPARD SECURITY<br />

NOTE Cryptography and encryption are very big, complicated topics. A great book that does<br />

a good job of explaining them, including keys and certificates, is Cryptography Decrypted, by<br />

H. X. Mel and Doris Baker (Addison-Wesley Professional, 2000).<br />

Double-clicking any of the items in your keychain will open up a window providing detailed<br />

information about that item. For items like passwords and secure notes, some details will be hidden,<br />

specifically the password and the actual content of the note.<br />

The password items have a number of options spread out over two tabs: the Attributes tab<br />

and the Access Control tab.<br />

The Attributes tab (Figure 8-3) provides the following information:<br />

Name: This is just the name of the keychain item.<br />

Kind: This is the category the item belongs to.<br />

Account: This is the name associated with the account. Usually this field contains the<br />

username, but occasionally, especially for application passwords, it is used to represent<br />

something used similarly by the application.<br />

Location: This identifies where the password is valid; this is commonly a URI pointing<br />

to the online resource for which the item is valid, but occasionally it is something else<br />

(a protocol, for example, or just something that has meaning to an application).<br />

Comments: This field contains any comments associated with the item.<br />

Password: This is where the password is shown. However, by default it is empty to protect<br />

the password. To view the password, you will need to select the View Password option and<br />

then authenticate yourself.<br />

Figure 8-3. The Attributes tab of a password keychain item<br />

NOTE All of the fields in the Attributes tab are editable. If you are storing items here for your<br />

own reference, you may certainly edit these—however, if the item is being used by an application,<br />

altering this information may interfere with the normal operation of the application.<br />

The Access Control tab (Figure 8-4) allows you to delegate what applications can access the<br />

keychain item, and whether or not you’ll be prompted to approve any new application that<br />

wishes to use the information.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!