Next: Shared-key and anonymous authentication, Previous: Certificate authentication, Up: Authentication methods [Contents][Index]
Certificates are not the only structures involved in a public key infrastructure. Several other structures that are used for certificate requests, encrypted private keys, revocation lists, GnuTLS abstract key structures, etc., are discussed in this chapter.
• PKCS 10 certificate requests: | ||
• PKIX certificate revocation lists: | ||
• OCSP certificate status checking: | ||
• Managing encrypted keys: | ||
• certtool Invocation: | Invoking certtool | |
• ocsptool Invocation: | Invoking ocsptool | |
• danetool Invocation: | Invoking danetool |