Next: Shared-key and anonymous authentication, Previous: Certificate authentication, Up: Authentication methods [Contents][Index]
Certificates are not the only structures involved in a public key infrastructure. Several other structures that are used for certificate requests, encrypted private keys, revocation lists, GnuTLS abstract key structures, etc., are discussed in this chapter.
| • PKCS 10 certificate requests: | ||
| • PKIX certificate revocation lists: | ||
| • OCSP certificate status checking: | ||
| • Managing encrypted keys: | ||
| • certtool Invocation: | Invoking certtool | |
| • ocsptool Invocation: | Invoking ocsptool | |
| • danetool Invocation: | Invoking danetool |