i
Table of Contents
1 PKI Configuration······································································································································1-1
PKI Overview ··········································································································································1-1
PKI Terms········································································································································1-1
Architecture of PKI···························································································································1-2
Applications of PKI ··························································································································1-2
Operation of PKI ······························································································································1-3
Configuring PKI ·······································································································································1-3
Configuration Task List····················································································································1-3
Creating a PKI Entity ·······················································································································1-6
Creating a PKI Domain····················································································································1-7
Generating an RSA Key Pair·········································································································1-10
Destroying the RSA Key Pair ········································································································1-11
Retrieving a Certificate ··················································································································1-11
Requesting a Local Certificate ······································································································1-13
Retrieving and Displaying a CRL ··································································································1-14
PKI Configuration Example···················································································································1-15
Configuring a PKI Entity to Request a Certificate from a CA ························································1-15
Configuration Guidelines·······················································································································1-20