PKI components, both those on clients such as certificate stores and certificates and those on the CA, interoperate to provide public key technologies as part of network operations. Many operating system processes and applications use these services. Many of these processes, such as the use of certificates by IPSec policies and VPNs, are detailed in other chapters. Others, such as certificate enrollment and revocation, that are part of the certificate lifecycle and certificate chaining, which is key to certificate validation, are described in this section.
The certificate lifecycle consists of several events:
The Certificate ...