Next: Shared-key and anonymous authentication, Previous: Certificate authentication, Up: Authentication methods [Contents][Index]
Certificates are not the only structures involved in a public key infrastructure. Several other structures that are used for certificate requests, encrypted private keys, revocation lists, GnuTLS abstract key structures, etc., are discussed in this chapter.
| • PKCS 10 certificate requests | ||
| • PKIX certificate revocation lists | ||
| • OCSP certificate status checking | ||
| • OCSP stapling | ||
| • Managing encrypted keys | ||
| • certtool Invocation | Invoking certtool | |
| • ocsptool Invocation | Invoking ocsptool | |
| • danetool Invocation | Invoking danetool |