-
Certificate Authority (CA):
- The trusted entity, usually a server, that issues digital certificates.
- Certificates verify a process or user's identity.
-
Intermediate CA:
- Any Certificate Authorities between the Root CA and the end user or final process.
-
Mapping:
-
One-to-One Mapping:
- When an individual certificate is mapped to a single recipient.
-
Many-to-One Mapping (Overloading):
- When multiple certificates are mapped to a single recipient.
-
Registration Authority (RA):
- Used to verify requests for certificates.
-
Types:
-
Certificate Revocation List (CRL):
- A list of certificates no longer valid or that have been revoked by the issuer.
- These certificates should no longer be trusted.
-
Online Certificate Status Protocol (OCSP):
- An alternative to using a certificate revocation list (CRL). It contains less information than a CRL does, and does not require encryption.
- OCSP was created as an alternative to CRL, but has been criticized for putting all computing strain on the Certificate Authority.
- Newer Versions (See OCSP Stapling) remedy this by forcing authorizations to be addressed at the site of the certificate receiver.
- See RFC 6960 for more on OCSP.
-
Key Escrow:
- Also known as a fair cryptosystem
- When certificate keys are held in case third parties, such as government or other organizations, need access to encrypted communications.
-
Key Recovery Agent:
- Software that can be used to archive and restore keys if necessary.
-
Certificate Signing Request (CSR):
- A message sent from an applicant to the CA to apply for a certificate.
-
CSRs contain:
- The public key
- Identifying information
- Integrity protection (digital signature).
-
Online vs Offline CA:
- In a Public Key Infrastructure (PKI), the chain of trusted authorities begins with the root certificate authority (Root CA).
- Once the root CA is installed and the root certificate is created, the system administrator must issue certificates authorizing intermediate/subordinate CAs.
- A common method to ensure the security and integrity of a root CA is to keep it in an offline state, and only bring it online when it is needed for specific, infrequent tasks - typically limited to the issuance or re-issuance of certificates granting authority to intermediate CAs.
- See RFC 5280 for more information