ABSTRACT

As discussed in Chapter 4, “PKI Management and Security,” the certicate policy (CP) and the certicate practice statement (CPS) addresses controls for the public key infrastructure participants-the certicate authority (CA), the registration authority (RA), the relying party, and the subscriber. We also introduced the policy authority (PA). is chapter continues the discussion for the various PKI roles and responsibilities. We rst consider Table 5.1 that provides a high-level description of responsibilities for each primary role.