ABSTRACT

Previous chapters in this book have looked at public key infrastructures (PKI) from a high level, identifying its components and its value to secure private and personal communications. PKIs explicitly define how digital certificates will be used by the enterprise, how much trust users can place in them, and how to manage certificate existence (issuance, use, renewal, and revocation).