This section provides an overview of Certificate System, including general PKI principles and specific features of Certificate System and its subsystems. Planning a deployment is vital to designing a PKI infrastructure that adequately meets the needs of your organization.
Table of Contents
- 1. Introduction to Public-Key Cryptography
- 2. Introduction to Red Hat Certificate System
- 3. Supported Standards and Protocols
- 4. Planning the Certificate System
- 4.1. Deciding on the Required Subsystems
- 4.2. Defining the Certificate Authority Hierarchy
- 4.3. Planning Security Domains
- 4.4. Determining the Requirements for Subsystem Certificates
- 4.4.1. Determining Which Certificates to Install
- 4.4.2. Planning the CA Distinguished Name
- 4.4.3. Setting the CA Signing Certificate Validity Period
- 4.4.4. Choosing the Signing Key Type and Length
- 4.4.5. Using Certificate Extensions
- 4.4.6. Using and Customizing Certificate Profiles
- 4.4.7. Planning Authentication Methods
- 4.4.8. Publishing Certificates and CRLs
- 4.4.9. Renewing or Reissuing CA Signing Certificates
- 4.5. Planning for Network and Physical Security
- 4.6. Tokens for Storing Certificate System Subsystem Keys and Certificates
- 4.7. Implementing a Common Criteria Environment
- 4.8. A Checklist for Planning the PKI