Next: Shared-key and anonymous authentication, Previous: Certificate authentication, Up: Authentication methods [Contents][Index]
Certificates are not the only structures involved in a public key infrastructure. Several other structures that are used for certificate requests, encrypted private keys, revocation lists, GnuTLS abstract key structures, etc., are discussed in this chapter.
• PKCS 10 certificate requests | ||
• PKIX certificate revocation lists | ||
• OCSP certificate status checking | ||
• OCSP stapling | ||
• Managing encrypted keys | ||
• certtool Invocation | Invoking certtool | |
• ocsptool Invocation | Invoking ocsptool | |
• danetool Invocation | Invoking danetool |