O'Reilly logo

Security without Obscurity by W. Clay Epstein, Jeff Stapleton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5

PKI Roles and Responsibilities

As discussed in Chapter 4, “PKI Management and Security,” the certificate policy (CP) and the certificate practice statement (CPS) addresses controls for the public key infrastructure participants—the certificate authority (CA), the registration authority (RA), the relying party, and the subscriber. We also introduced the policy authority (PA). This chapter continues the discussion for the various PKI roles and responsibilities. We first consider Table 5.1 that provides a high-level description of responsibilities for each primary role.

Table 5.1

Public Key Infrastructure Primary Roles and Responsibilities

Primary Role

Responsibilities

PKI technicians

Technicians are individuals ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required