Access Control and Identity Management

Certificate Authorities (CAs) and Digital Certificate Management

Certificate authorities were briefly discussed earlier in the chapter. This section provides more details about CAs and helps you decide whether to manage certificates in-house or outsource the task to a third party.

Every digital certification implementation is done through a root CA. Each root CA has a digital certificate that is issued by a root CA and to a root CA. A root CA becomes both an issuer and a receiver. This process is called a self-signed digital certificate, which is the root certificate to all certificate implementations. The certificate PKI software or hardware looks for the self-signed certificate and extracts the ...

Get Access Control and Identity Management, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.