Chapter 12. PKI Operational Considerations
To operate a PKI successfully, you must take into consideration a number of requirements, characteristics, and options. This chapter defines PKI operational considerations as those practices, components, or facilities necessary for the PKI to function. (These do not include, for example, explicit PKI operations themselves.) In general, such operational considerations are sufficiently fundamental to the overall architecture that concrete decisions must be made and explicit actions must be taken in advance of PKI deployment.
In this chapter, we discuss a number of these operational considerations, including client-side software, off-line operations, physical security, hardware components, user key compromise, ...
Get Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.