-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Active Directory Administration Cookbook, Second Edition
By :

Certificates, as part of a Public Key Infrastructure (PKI), have several practical uses:
Certificates are based on cryptographic public keys and private keys. This key pair is generated upon the creation of a certificate by a Certification Authority (CA). When used to encrypt data, files, and folders, only with the right private key can data be decrypted that was encrypted with a given public key, and vice versa. When used to sign in, only the right key can be used to verify the identity.
Every certificate has a subject and a lifespan. A typical lifespan is one year. However, once a certificate is issued to you or a system, it can be revoked during its lifespan. Every time a certificate action is performed, the certificate revocation status is checked with the CA that issued...