IBM®
SecureWay®
Trust Authority
gkZ H;-
v| 3 1.: 1
SA30-0874-00
IBM
IBM®
SecureWay®
Trust Authority
gkZ H;-
v| 3 1.: 1
SA30-0874-00
IBM
VG!
L $8 W vx &0; gkOb |! 55 dLvG :VGgW;! VB O] $8& P8JC@.
JG(1999b 10y)
L %: IBM SecureWay Trust Authority,ANW% 5648-D09, v| 3 1.: 1! {kGg, DSG! /0w mCOb |nv p
g DS 1.: W v$ v|! {kKOY.
© Copyright International Business Machines Corporation 1999b. All rights reserved.
qw
&1e Trust Authority $8 . . . . . . 1
&2e 3d . . . . . . . . . . . . . 3
&3e f} . . . . . . . . . . . . . 5
nO % dLv! W<: . . . . . . . . 5
%; gkO) nO . . . . . . . . . . 6
jslz Nu d; . . . . . . . . . 6
-v GB e! nO . . . . . . . . 8
g| nO . . . . . . . . . . . . 10
nO sB !K . . . . . . . . . . 12
%sG Nu |. . . . . . . . . . . 13
Nu 8y . . . . . . . . . . . . 13
jslz!- ;E . . . . . . . . . 14
jslz!- kR . . . . . . . . . 15
,sLp. @kANW%! W<: . . . . 16
,sLp.& gkO) nO . . . . . . . 17
g|nO DO; gkO) nO . . . . 17
.#hG ID& gkO) nO . . . . . 18
,sLp.& gkO) Nu |. . . . . . 18
Nu GB 8y d; h& . . . . . . 18
:6. +e!- DON Nu ]b . . . 19
DO!- :6. +eN Nu ]T . . . 19
Y% :6. +eN Nu L? . . . . . 19
<NgW; 8b 'X Nu -b . . . . 20
Nu 8y . . . . . . . . . . . . 20
Nu ;E . . . . . . . . . . . . 21
Nu 8b ;E . . . . . . . . . . 21
Nu kR . . . . . . . . . . . . 22
Nu qO 8b . . . . . . . . . . 22
G gLG L? . . . . . . . . . . 23
%G 8Y 9: ` %C . . . . . . . 23
% - )b 6$ . . . . . . . . . 23
,sLp.& gkO) :6. +e |. . . 23
Y% :6. +e -b . . . . . . . 24
:6. +e O# /f . . . . . . . 24
:6. +e nO $8 8b. . . . . . 25
,sLp. >a. . . . . . . . . . . 25
&4e $8 . . . . . . . . . . . . 27
nO . . . . . . . . . . . . . . 27
g|nO . . . . . . . . . . . . 27
% jslz vx . . . . . . . . . 28
nO . . . . . . . . . . . . . . 29
qnO: $% . . . . . . . . . . 29
nO b| . . . . . . . . . . . . 29
nO %LM#L: . . . . . . . . . 29
nO 5^N . . . . . . . . . . . 30
nO 9Ze . . . . . . . . . . . 30
9Ze S: . . . . . . . . . . . 31
Nu . . . . . . . . . . . . . . 31
Nu b| . . . . . . . . . . . . 31
Nu kR qO . . . . . . . . . . 31
p:d. . . . . . . . . . . . . 32
8P L' . . . . . . . . . . . . 32
Nu . . . . . . . . . . . . . . 32
jslz Nu . . . . . . . . . . 33
CA Nu . . . . . . . . . . . . 33
-v GB e! Nu . . . . . . . . 34
Nu .e . . . . . . . . . . . . 34
Nu sLA gL, . . . . . . . . 34
;E !I: . . . . . . . . . . . 34
8H Zx W<: . . . . . . . . . . 35
W<: &n . . . . . . . . . . . 35
Nu W GQN) . . . . . . . . . 35
pvP -m . . . . . . . . . . . 35
:6. +e . . . . . . . . . . . 35
© Copyright IBM Corp. 1999b iii
&5e |6gW . . . . . . . . . . . 37
% dLv nO gD . . . . . . . . . 37
&x Nu /| . . . . . . . . . . . 40
Nu kR g/ . . . . . . . . . . . 42
,sLp. @kANW% b; " . . . . . 43
:6. +e 8b "G ^:. . . . . . 43
:6. +e 8b "G G . . . . . . 44
:6. +e 8b "G % . . . . . . 44
,sLp. @kANW% k- sZ . . . . 45
Nu ;E k- sZ . . . . . . . . 45
O# /f k- sZ . . . . . . . . 46
Nu h& k- sZ . . . . . . . . 46
Nu ]b k- sZ . . . . . . . . 47
Nu ]T k- sZ . . . . . . . . 47
g|nO DO gk ET Nu k- sZ 47
.#hG ID& gkOB ET Nu k-
sZ . . . . . . . . . . . . . 48
Nu -b k- sZ . . . . . . . . 49
:6. +e -b k- sZ . . . . . 50
Nu ;E k- sZ . . . . . . . . 50
Nu kR k- sZ . . . . . . . . 51
:6. +e nO $8 k- sZ . . . . 52
,sLp. @kANW%! kQ 5r; . . . 53
VGgW . . . . . . . . . . . . . 55
s% W -q: s% . . . . . . . . . 57
|C $8 . . . . . . . . . . . . . 61
kn} . . . . . . . . . . . . . . 63
vN . . . . . . . . . . . . . . 79
iv Trust Authority: gkZ H;-
&1e Trust Authority $8
IBM®
SecureWay®
Trust Authority: gkZ& NuOm EZR8Q kE; 8
eOb 'Q v\z T2 @kANW%; &xUOY.
v 6wL nO W Nu $%! {s pvP Nu; _`, x% W |.R v V5
O UOY.
v X.509 v| 3(PKIX)k xk 0 ON86M xk %LM 8H F0X3(CDSA)
O#- %X; 'Q vx: GEw<G s# nk:; (HUOY.
v pvP -mz 8H ANd]: .#hGG pg sk& NuOb 'Q v\;
&xUOY.
v jslz W ,sLp. b]G nO bI: VkG 6k:; &xUOY.
v O#-H kEz nO $8G 8H ze: bP:; 8eUOY.
Trust Authority C:[: IBM AIX/6000®
z Microsoft Windows NT -v C
'{s!- G`I v V@OY. L C:[: Y=G Vd bIi; wTUOY.
v EZ ^B Nu b|(CA)L pvP NuG |< sLA gL,; |.UOY.
NuG Nu:; 8uOb 'X CAB _`OB " Nu; pvP fD8N -
mUOY. GQ Nu kR qO(CRL); -mO) NuL u Ls /?Ov J
YB gG; 8uUOY. -m 0& 8Y .GOT 8#Ob 'X IBM
SecureWay 4758 PCIO#- ZAN<-M 0: O#- Oe~n& gkR v
V@OY.
v nO b|(RA): gkZ nO LiG |. 8:)& 3.UOY. RAB gk
ZG qnO: 0?; vxOB Nu8L _`Gm W/Q NuL c!H gk
Z!T8 _`I v V5O UOY. |. 8:)B Z?-H AN<:* gwG
Gg a$; kX 3.I v V@OY.
v % b]G nO NMdL:B VPN(!s 3Nk W.v)) e!, :6. +e,
8H |Z lmz 0: jslz, -v W b8 q{; 'Q Nu 9f; kL
OT UOY.
© Copyright IBM Corp. 1999b 1
v Windows @kANW%N Trust Authority ,sLp.& gkOi V> gk
Z! % jslz& gkOv Jm5 Nu; 9fOm |.R v V@OY.
v % b]G |. NMdL:N RA %:)>: xN nO cgZ! nO d;;
BNOE* ENOm NuL _`H D! Nu; |.R v VT UOY.
v (g -jC:[: " (g 9ZeG ^Cv Nu Ze(MAC)& hjUOY. (
g %LM! (g %LM#L:! bOH D! /fGE* h&GB fl MAC
B gkZ! 'T; (vR v VT UOY.
v $% "C.B @kANW% 3_Z! nO AN<:& gkZ $GR v VT
UOY.
v O#- #x; 'Q kU vx. kE; NuOb 'X YI Trust Authority 8
:dRB xe }: 3Nk 0N -mKOY. 0M MAC 0: 8H @j'.
B O#-Gn KeyStoresB 8#H 5*! zeKOY.
v IBM SecureWayp:d.! kQ kU vx. p:d.B /? Nu W kR
H Nu! kQ $8& LDAP Xv |D8N zeUOY.
v IBM WebSphere™
Application ServerW IBM HTTP Server! kQ kU
vx. % -vB RA -vM T2 [kO) ^Cv& O#-Om, d;; Nu
Og G5H vIN!T Nu; |[UOY.
v vs fBL VB IBM DB2®
Universal Database! kQ kU vx.
2 Trust Authority: gkZ H;-
&2e 3d
6wL Trust Authority! GX 8#GB 8H @kANW%; .m V; ', {
}Q Z] um-& .m VB gkZ8 Xg @kANW%! W<:R v V@O
Y. pvP Nuz 0: Z] um-& xOB ):!! {UQ $8& &xO)
d;R v V@OY. nO d;G %LMB d;; BNOE* ENOb 'Q a
$G dk! KOY. nO d;L BNGB fl Trust Authority nO b|(RA)
: d;; 3.Om Trust Authority Nu b|(CA): Nu& _`UOY. nO
d;z NuG 9ZeB O#-H nO %LM#L:! 8|KOY.
Trust Authority C:[: Nu; d;Ob 'Q Q !v LsG f}; &xUO
Y.
v % dLv!- gkR v VB Trust Authority nO gD.
v Microsoft Windows!- G`GB Trust Authority ,sLp. @kANW%.
6w: nOZM qnO: $%! !e {UQ MLsi n@ Q !v nO f}
L* N !v f} pN& gkR v V@OY.
nO gD; gkOi Nu; d;Ob 'X JdQ $8& &bQ D! 9F!
Trust Authority nO @kANW%!- @d; r; v V@OY. jslz Nu,
-v Nu GB e! Nu; E;R v V@OY. GB PKIX Xv @kANW%
! W<:Ob 'Q Nu; 'X g| nOR v V@OY. GQ nO % dLv
N 9F! W w!- nO; O) w" ^B Nu; |.R v V@OY.
,sLp. @kANW%: LL g| nOH gkZ& 'X 3hH 8Y #\Q
AN<:& &xUOY. L @kANW%: gkZ! Nu; |.OB % 5r;
Vb 'X k- sZM mIn5 &xUOY.
L H;-B L/Q nO 8:)!- gkZ& vxUOY.
© Copyright IBM Corp. 1999b 3
4 Trust Authority: gkZ H;-
&3e f}
L =GG V&B Y=; &xUOY.
v Trust Authority nO % dLv!- Nu; 'Q nOG " \h! kQ vC
gWz L dLv& gkO) gkZ! 9fQ jslz Nu; |.OB M!
kQ vCgW.
v g|nO D! Nu; d;Ob 'X GB Nu; |.Om gkOb 'X Trust
Authority ,sLp. @kANW%; gkOB M! kQ vCgW.
nO % dLv! W<:
nO; 'X % dLv! W<:OAi:
1. nO; 'X gkR jslz& a$OJC@. nO % dLv! W<:Ob '
X vxGB jslz _!- O*! JdUOY.
v Netscape NavigatorGB Communicator,1.: 3.0 Ls
v Microsoft Internet Explorer,1.: 4.0 Ls
2. nO % dLv! W<:Ob 'Q 6wG URL; TvOJC@. URL: Y
= |D; .T KOY.
http://MyPublicWebServer/MyDomain/index.jsp
3. jslz& -m URL; TBOJC@.
v Netscape!- '!! VB X:. sZ! URL; TBOJC@.
v Internet Explorer!- VR! VB X:. sZ! URL; TBOJC@.
4. Enter 0& )#JC@.
Trust Authority nO % dLv! %CKOY. b; 3!G fl dLv L'
: Z] um- >MTOY.
5. 3=8N Trust Authority nO -q:& gkOB fl, -vG CA Nu3
!& )#JC@.
© Copyright IBM Corp. 1999b 5
L Nu: jslz! nO -q:MG kE; NuR v VT UOY. Y=!
L -q:& gkR ' L \h& }+R v V@OY.
%; gkO) nO
L =GG V&B % jslz& gkO) Trust Authority nO dLv!- Nu
; d;OB f}! kX 3mUOY.
3=8N nO -q:& gkOB fl hSOb |! % jslz! kQ CA N
u; 9fX_ UOY. W D! nO dLv& ]9X- gkR v V@OY.
nO @kANW%; 6w! BT gkZ $GOB f}! {s, /?Q Nu; r
b 'Q }w! ^sz v V@OY. Y= V&B b; \h& &xUOY. gk
ZG gL.! {UQ }w! kX-B C:[ |.Z!T .GOJC@.
jslz Nu d;
% jslz& kX jslz Nu; kfOAi:
1. jslz!- nO % dLv! W<:OJC@.
2. nO /|!- qO; -m jslz Nu; 1COJC@.
3. 6!!- nO; 1COJC@.
4. .N; )#JC@.
gkZ! d;Q nO -iL %CKOY.
5. % dLvG vCgW! {s gDG Je TB; OaOJC@. 37 dLvG
:% dLv nO gD;: Je! kX 3mUOY. gD: Y= =G; wT
UOY.
v gkZ |C $8& &xOB X:. sZ! wTH nO$8 =G.
v gkZ! xOB Nu |C $8& &xOB X:. sZ! wTH Nu d
; $8 =G. =GG 1C Je! *; &xOv JB fl, Trust Authority
: gkZ! d;OB NuG /|! ,|H b;*; &xUOY.
Y= Jei! /w VGOJC@.
6 Trust Authority: gkZ H;-
Nu /|
6w!- gkZ! &xOb& xOB jslz NuG >y& 1CO
JC@. 40 dLvG :&x Nu /|;: Nu /|! kX 3mUO
Y.
jslz! kQ CA Nu 3!
Nu /|! BT #/GB s@OB CA Nu; rb 'X )#JC
@. L \_& )#i CA NuL oC YnNeKOY.
L Nu: jslz! Trust AuthorityzG kE; NuR v VT U
OY. n !v L/N gkZ! LL ?OQ CA Nu; .m VB f
l, G Y% NuL Jd x@OY.
|Z lm VR
|Z lm kv& 1COAi gkZG |Z lm VR& &xX_ U
OY.
|Z lm kv
d; az! kQ |Z lm; vIOAi L Wq; 1COJC@.
5| @d
gkZ! &xOB 5| @d: kR.Z 8PLsB !; boOJC
@. _D! nO d;G sB& !KX_ QYB M; KF_ R MT
OY.
5^N L'
NuG gkz |CGn VB fl nO 5^NG L'; &xOJC
@.
6. nO d; &b; )#JC@.
Trust AuthorityL nO gD; "vQ D! Y=z 0L x`KOY.
v gD! @y! wTH fl gkZ!T @y& 8) ]OY. gD; /fO
m nO d; YC &b; )#JC@.
v gD! @y! wTGv J: fl Y% % dLv! gkZG d; ID&
%CUOY.
&3e f} 7
7. d; ID& .GOT bOOJC@. _D! gkZ& D0O) gkZB d;
G sB& !KOm Xq! I ' Nu; ^; v VT KOY. % dLv!
3mH kN Y= _ O*& v`OJC@.
v L -i8N 1T 9F! Nu; !KR v V5O % dLv& O6)OJ
C@.
v 9F% ' &xR v V5O d; ID& bOOJC@.
v d; ID! |Z lm8N 5xO5O bY.JC@.
-v GB e! nO
gkZ! nOOB -v* e!B L H;-! $GH M33 /$ /:; .m V
n_ UOY. 34 dLvG :-v GB e! Nu;: L /:i; 3mUOY.
% jslz& kX -v* e! Nu; kfOAi:
1. jslz!- nO % dLv! W<:OJC@.
2. nO /|!- qO; -m -v GB e! Nu; 1COJC@.
3. 6!!- nO; 1COJC@.
4. .N; )#JC@.
gkZ! d;Q nO -iL %CKOY.
5. % dLvG vCgW! {s gDG Je TB; OaOJC@. 37 dLvG
:% dLv nO gD;: Je! kX 3mUOY. gD: Y= =G; wT
UOY.
v gkZ |C $8& &xOB X:. sZ! wTH nO$8 =G.
v gkZ! -v* e!! kX xOB Nu! kQ $8& &xOB X:.
sZ! wTH Nu d; $8 =G. =GG 1C Je! *; &xOv J
B fl, Trust Authority: gkZ! d;OB NuG /|! ,|H b;
*; &xUOY.
Y= Jei! /w VGOJC@.
8 Trust Authority: gkZ H;-
Nu /|
6w!- gkZ! d;Ob& xOB -v GB e! NuG >y&
1COJC@. 40 dLvG :&x Nu /|;: Nu /|! kX 3
mUOY.
DON CA Nu ze
Nu /|! BT #/GB s@OB CA Nu; rb 'X )#JC
@. jslz! gkZ!T fN& d8OT KOY. L \_& )#
i CA NuL oC YnNeKOY.
L Nu: -v* e!! Trust AuthorityzG kE; NuR v V
T UOY. n !v L/N gkZ! LL ?OQ CA Nu; .m V
B fl, G Y% NuL Jd x@OY.
|Z lm VR
|Z lm kv& 1COAi gkZG |Z lm VR& &xX_ U
OY.
|Z lm kv
d; az! kQ |Z lm; vIOAi L Wq; 1COJC@.
5| @d
gkZ! &xOB 5| @d: kR.Z 8PLsB !; boOJC
@. _D! nO d;G sB& !KX_ QYB M; KF_ R MT
OY.
5^N L'
NuG gkz |CGn VB fl nO 5^NG L'; &xOJC
@.
6. nO d; &b; )#JC@.
Trust AuthorityL nO gD; "vQ D! Y=z 0L x`KOY.
v gD! @y! wTH fl gkZ!T @y& 8) ]OY. gD; /fO
m nO d; YC &b; )#JC@.
v gD! @y! wTGv J: fl Y% % dLv! gkZG d; ID&
%CUOY.
&3e f} 9
7. d; ID& .GOT bOOJC@. _D! gkZ& D0O) gkZB d;
G sB& !KOm Xq! I ' Nu; ^; v VT KOY. % dLv!
3mH kN Y= _ O*& v`OJC@.
v L -i8N 1T 9F! Nu; !KR v V5O % dLv& O6)OJ
C@.
v 9F% ' &xR v V5O d; ID& bOOJC@.
v d; ID! |Z lm8N 5xO5O bY.JC@.
g| nO
PKIX Xv @kANW%! W<:Ob 'Q Nu; 'X nO -q:& gkO
) gkZ ZEL* Y% ):!& g| nOR v V@OY. _D! Trust
Authority ,sLp. @kANW%; gkOB ?H Nu; YnNeR v V@
OY.
% jslz& kX ):!& g| nOOAi:
1. jslz!- nO % dLv! W<:OJC@.
2. nO /|!- qO; -m Nu g|nO; 1COJC@.
3. 6!!- nO; 1COJC@.
4. .N; )#JC@.
gkZ! d;Q nO -iL %CKOY.
5. % dLvG vCgW! {s gDG Je TB; OaOJC@. 37 dLvG
:% dLv nO gD;: Je! kX 3mUOY. gD: Y= =G; wT
UOY.
v gkZ! g| nOOB gw! kQ $8& &xOB X:. sZ! wT
H nO $8 =G. )b! d; sB& !KR v VT R n !v $85
&xUOY.
v gkZ! xOB Nu |C $8& &xOB X:. sZ! wTH Nu d
; $8 =G. =GG 1C Je! *; &xOv JB fl, Trust Authority
: gkZ! d;OB NuG /|! ,|H b;*; &xUOY.
Y= Jei! /w VGOJC@.
10 Trust Authority: gkZ H;-
Nu /|
gkZ! g| nOOB gw!T JdQ Nu /|; 1COJC@.
40 dLvG :&x Nu /|;: Nu /|! kX 3mUOY.
|Z lm VR
|Z lm kv& 1COAi gkZG |Z lm VR& &xX_ U
OY.
|Z lm kv
d; az! kQ |Z lm; vIOAi L Wq; 1COJC@.
5| @d
gkZ! &xOB 5| @d: kR.Z 8PLsB !; boOJC
@. _D! nO d;G sB& !KX_ QYB M; KF_ R MT
OY.
5^N L'
NuG gkz |CGn VB fl nO 5^NG L'; &xOJC
@.
6. nO d; &b; )#JC@.
Trust AuthorityL nO gD; "vQ D! Y=z 0L x`KOY.
v gD! @y! wTH fl gkZ!T @y& 8) ]OY. gD; /fO
m nO d; YC &b; )#JC@.
v gD! @y! wTGv J: fl Y% % dLv! gkZG d; ID&
%CUOY.
7. d; ID& .GOT bOOJC@. _D! gkZ& D0O) gkZB d;
G sB& !KOm Xq! I ' Nu; ^; v VT KOY. % dLv!
3mH kN Y= _ O*& v`OJC@.
v L -i8N 1T 9F! Nu; !KR v V5O % dLv& O6)OJ
C@.
v 9F% ' &xR v V5O d; ID& bOOJC@.
v d; ID! |Z lm8N 5xO5O bY.JC@.
&3e f} 11
nO sB !K
nO d;G sB& !KOAi nOOB ?H gkZ! O6)_x % dLvN
9F!E* Y= \h& OaOJC@.
1. nO % dLv! W<:OJC@.
2. nO /|!- d;Q nO /|; 1COJC@.
3. 6!!- sB !K; 1COJC@.
4. .N; )#JC@.
%C!B gkZG d;! kQ SGG $8& TvOb |! gkZG Ex
; NuX_ OB JeiL wTGn V@OY.
5. Je! $8& &xOJC@.
v d; ID!- gkZ! nO gD; &bQ D! %CGzx d; ID& T
BOJC@.
v 5| @d!- gkZ! nO gD! &x_x Mz 0: 5| @d; T
BOJC@.
6. nO sB !K; )#JC@.
^Cv! d;G vg sB& *8@OY.
v gkZG d;L Fw 8y _N fl, *_! 9F! YC !KR v V@
OY.
v d;L BNH fl d; /|: Y= \h& a$UOY.
jslz Nu
jslz NuL oC gkZG jslzN YnNeKOY.
-v GB e! Nu
jslz! gkZ!T gD W v$ fN& d8Q D! -v* e
! NuL Xg fNN YnNeKOY.
Nu g|nO
g|nOQ gwL Trust Authority ,sLp. @kANW%!- N
u; d;R 'nv NuL |^Gv J@OY.
12 Trust Authority: gkZ H;-
W kE! e!G Nu R/Z! Nu; d;Ob 'X JdN O
B $8 o, .#hG ID, O#, d;; BNQ RAG URL n;
< v V@OY.
V: xOB fl g|nO DO; &xR v V@OY. LM: N
u; d;R ' O#M T2 gkI v V@OY. DOG 9g
;; 8OAi g|nO DO ze; )#m DOG fN& v
$OJC@.
%sG Nu |.
nO % dLv!- gkZ! ^: jslz Nu; ;EOE* kRR v5 V@
OY. JdQ fl 58{8N kROB kE 8yC3 v V@OY. LM: g|
nOQ Nu! kX-B {kGv J@OY.
Nu 8y
nO % dLv!- w" 9fQ jslz Nu; 8yR v V@OY.
V: ,sLp. @kANW%; gkOB ?H Nu; vIQ fl Xg @kAN
W%; gkO) Nu; 8yX_ UOY.
Nu; 8yOAi:
1. nO % dLv! W<:OJC@.
2. nO /|!- jslz Nu; 1COJC@.
3. 6!!- kR& 1COJC@.
4. .N; )#JC@.
%C!B gkZM Nu; D0OB $8! wTGn V@OY.
5. $8& KdO) LML gkZ! 8yOAB NuNv .NOJC@.
6. g/!- Nu 8y& 1COJC@.
7. NuL u Ls /?Ov J: OZ!- p& Nu; 8yRv& v$OJC
@. vg OZ* zEG OZ& 1COJC@.
8. Nu kR& )#JC@.
&3e f} 13
V: CRL! bgGn VB ?H NuL 8b! Gv JB Q _D! YC ?B;
.T G5O d;R v V@OY.
jslz!- ;E
nO % dLv!- w" 9fQ jslz Nu; ;ER v V@OY.
V: ,sLp. @kANW%; gkOB ?H Nu; vIQ fl Xg @kAN
W%; gkO) Nu; ;EX_ UOY.
Nu; ;EOAi:
1. nO % dLv! W<:OJC@.
2. nO /|!- jslz Nu; 1COJC@.
3. 6!!- ;E; 1COJC@.
4. .N; )#JC@.
;E gDL %CKOY.
5. gD; KdO) LML gkZ! ;EOAB NuNv KuOJC@.
6. xOB fl m} !IQ JeG *; /fOJC@. 37 dLvG :% dLv
nO gD;: Je! kX 3mUOY.
|Z lm VR
|Z lm kv& 1COAi gkZG |Z lm VR& &xX_ U
OY.
|Z lm kv
d; azG |Z lm8N kv& ^5O OAi LM; 1COJC
@.
5| zG
d;; !KR ' d; ^T I z.; /fR v V@OY.
5| @d
gkZ! &xOB 5| @d: kR.Z 8PLsB !; boOJC
@. _D! nO d;G sB& !KX_ QYB M; KF_ R MT
OY.
14 Trust Authority: gkZ H;-
Internet Explorer k
v O#- -q:! kQ x^Z& /fOAB fl gDG vCgW
! {#JC@.
v ET 0 <.& }:R MNv GB b8 0 <.& YC gkR M
Nv )N& a$OJC@. ET 0 <.G fl L'; gkZ! v
$OB IGL Vn}OY.
v xOB fl _! 8H IG; 1CO) Microsoft Internet Explorer
!- 8Y .GQ 8H 63& d;OJC@.
7. Nu ;E; )#JC@.
8. d; ID! %CI ' 8yO) _D! d; sB& !KR v VT OJC@.
12 dLvG :nO sB !K;: d; sB& !KOB f}! kX 3mUO
Y.
jslz!- kR
nO % dLv!- w" 9fQ jslz Nu; kRR v V@OY.
V: ,sLp. @kANW%; gkOB ?H Nu; vIQ fl Xg @kAN
W%; gkO) Nu; kRX_ UOY.
Nu; kROAi:
1. nO % dLv! W<:OJC@.
2. nO /|!- jslz Nu; 1COJC@.
3. 6!!- kR& 1COJC@.
4. .N; )#JC@.
Nu; .NOB $8! %CKOY.
5. $8& KdO) LML gkZ! kROAB NuNv KuOJC@.
6. g/!- Nu; kROB g/& 1COJC@. 42 dLvG :Nu kR g
/;B /?Q L/! kX 3mUOY.
7. NuL u Ls /?Ov J: OZ!- p& Nu; kRRv& v$OJC
@. vg OZ* zEG OZ& 1COJC@. g/! OZM ,|H fl X
&3e f} 15
g OZ& gkOJC@. 9& in, 0! UsH M8N GIGB fl Us
L _}H M8N }"OB OZ& 1COJC@.
8. Nu kR& )#JC@.
,sLp. @kANW%! W<:
,sLp. @kANW%; gkO) d;Om ):!! gkZ& g| nOQ D
! !s GB 0.{ :6. +e! Nu; zeOJC@. GQ ,sLp. @k
ANW%; gkO) :6. +eG Nu; |.Om ::N :6. +e& |.
R v V@OY. L pg Nu: PKIX Xv @kANW%! W<:Ob 'Q M
TOY.
,sLp. @kANW%! W<:OAi:
1. gkZG 0.{ :6. +e& gkOAi pTOJC@.
2. Windows [w %CY!- C[ → ANW% → IBM SecureWay Trust
Authority → ,sLp.; 1COJC@.
3. :C!C -i!- .N; )#JC@.
:6. +e -b k- sZ! %CKOY. ,sLp. @kANW%8N Q$
GB :6. +eG qOL wTGn V@OY. dLv 50: k- sZ& 3
mUOY.
4. :6. +e!- -AB :6. +e& 1COJC@.
5. O#!- :6. +e O#& TBOJC@.
6. .N; )#JC@.
:6. +e 8b "L %CKOY. dLv 43: "; 3mUOY.
V: p 8b 9$N Nu; .m VB fl, ,sLp. @kANW%L L N
ui; %CO) gkZ! Nu; ;EX_ Rv& a$R v VT UO
Y. 21 dLvG :Nu 8b ;E;: L/Q fl! +y; X_ Rv&
3mUOY.
16 Trust Authority: gkZ H;-
,sLp.& gkO) nO
,sLp. @kANW%; gkO) Nu; d;R v Vb |! Trust Authority
nO % dLv! g|nOX_ UOY. RA |.ZB gkZ& g|nOR MT
OY.
g|nO $8& ^: D! ,sLp. @kANW%; gkO) Nu; d;OJ
C@. gkZ! vIOB g|nO $8G >y! 1CR ,sLp. ^: IG;
a$UOY.
v g|nO DO
v .#hG ID
g|nO DO; gkO) nO
:6. +e 8b "!-:
1. Nu ^:& -m ET → g|nO DO gk; )#JC@.
g|nO DO gk ET Nu k- sZ! %CKOY. dLv 47: k- s
Z& 3mUOY.
2. k- sZG Je& OaOm Y=; )#JC@.
k- sZ!- Y=! 8T GB M: 6wG 1C! {s ^s}OY. Y=
; < v V; MTOY.
v gkZG Nu d;; 3mOB S:z W *.
v %CG F!J !nL! VB Je, L Je '! TB; O) ON S:
*; /fR v V@OY.
3. JdQ /f; OJC@.
4. Y=; -/ d;; &bOJC@.
5. .N sZ!- Oa& )#JC@.
nO b|L d;; BNQ D! Nu: gkZ! , :6. +e! Z?8N z
eKOY.
&3e f} 17
.#hG ID& gkO) nO
:6. +e 8b "!-:
1. Nu ^:& -m ET → .#hG ID gk; )#JC@.
.#hG ID gk ET Nu k- sZ! %CKOY. dLv 48: k- s
Z& 3mUOY.
2. Je& OaOJC@.
3. Y=; -/ d;; &bOJC@.
4. .N sZ!- Oa& )#JC@.
nO b|L d;; BNQ D! Nu: gkZ! , :6. +e! Z?8N z
eKOY.
,sLp.& gkO) Nu |.
,sLp. @kANW%; gkOi gkZ! , :6. +eG pg gkZ N
u; |.R v V@OY. G Y% :6. +eG Nu8N [w; OE* Y%
:6. +eG Nu; ^8Ai ,sLp. @kANW%; >aX_ UOY. Y
=! gkOAB :6. +eN YC C[OJC@.
Nu GB 8y d; h&
V: L 6!B 1T `R v Vv8 'NB |t W8v J; v5 V@OY. N
u GB Nu; |.OB ?H gkZ! _`Q d;; h&Ob |! C#;
;n Xg 3m; KdOJC@. Ln- Nu; h&OE* Nu! 5b; L
!B d;; h&OAm OBv& .NOJC@.
:6. +e 8b "!-:
1. h&OAB NuL* 8y d;; 1COJC@.
2. Nu ^:& -m h& →Nu h&& )#JC@.
3. Nu h& k- sZ! %CKOY. dLv 46: k- sZ& 3mUOY.
4. k- sZ!- Nu 3mL* 8y _N d;G 3m; KdOJC@. dLv
49B gkZ! 8T I <NgW; 3mUOY.
18 Trust Authority: gkZ H;-
5. .N; -/ h&& .NOE* }"; Y[ fl!B kR& )#JC@.
:6. +e!- DON Nu ]b
:6. +e 8b "!-:
1. -0 :6. +e!- ]bOAB Nu; 1COJC@.
2. Nu ^:& -m ]b; )#JC@.
3. Nu ]b k- sZ! %CKOY. dLv 47: k- sZ& 3mUOY.
4. Nu; O#-Ob 'X gkR O#- /|; 1COJC@.
5. Nu; zeOb 'Q DO; [:R '!& v$OJC@. fNM DO L'
; TBOE* GB #F8b& -/ fN& 1CQ Y= DO L'; TBO
JC@.
6. DO; 8#R O#& TBQ Y= YC TBO) .NOJC@. 8 - 323G
5}Z .Z& gkOJC@.
7. .N; )#E* }"; Y[ fl kR& )#JC@.
DO!- :6. +eN Nu ]T
:6. +e 8b "!-:
1. -0 :6. +eN ]TOAB Nu; 1COJC@.
2. Nu ^:& -m ]T; )#JC@.
3. Nu ]T k- sZ! %CKOY. dLv 47: k- sZ& 3mUOY.
4. NuL wTGn VB DOG vg '!& v$OJC@. fNM DO L';
TBOE* GB #F8b& -/ 1COJC@.
5. Nu; DON ]b_; ' [:Q O#& &xOJC@.
6. 3m{N L'; TBO) :6. +eG Nu; D0OJC@.
7. .N; )#E* }"; Y[ fl kR& )#JC@.
Y% :6. +eN Nu L?
:6. +e 8b "!-:
&3e f} 19
1. -0 :6. +e!- G Y% :6. +eN L?OAB Nu; 1COJC
@.
2. }w! {s Xg Nu; DON ]bOJC@. 19 dLvG ::6. +e!
- DON Nu ]b;: }w& 3mUOY.
3. ,sLp. @kANW%; >aOJC@.
4. Nu; 0.{ :6. +eN L?OAB fl Xg :6. +e& NeOJ
C@.
5. ,sLp. @kANW%; YC C[Om Lx!B Xg :6. +e& )J
C@. 24 dLvG :Y% :6. +e -b;B L8T Ob 'Q f}! kX
3mUOY.
6. }w! {s DO!- -0 :6. +eN Nu; ]TOJC@. 19 dLvG
:DO!- :6. +eN Nu ]T;: }w& 3mUOY.
<NgW; 8b 'X Nu -b
:6. +e 8b "!-:
1. 8Y s<OT 8AB Nu; 1COJC@.
2. Nu ^:& -m -b& )#JC@.
3. Nu -b k- sZ! %CKOY. dLv 49B k- sZ& 3mUOY.
4. k- sZ!- Nu 3m; KdOJC@.
5. OaGi .N; )#JC@.
Nu 8y
:6. +e 8b "!-:
1. 8yOAB Nu; 1COJC@.
2. Nu ^:& -m kR& )#JC@.
3. Nu kR k- sZ! %CKOY. dLv 51: k- sZ& 3mUOY.
4. k- sZ!- Nu 3m; KdOJC@. 3m!B OC x#M _`Z! w
TGn V@OY. dLv 49B gkZ! 8T I <NgW; 3mUOY.
5. g/!- Nu 8y& 1COJC@.
20 Trust Authority: gkZ H;-
6. RAG URL!- Je! LL $vvv J: fl Nu! kQ gkZG VJ
d;; BNQ nO b|G URL; 1COE* TBOJC@.
7. .N; )#E* }"; Y[ fl kR& )#JC@.
V: CRL! bgGn VB ?H NuL 8b! Gv JB Q _D! YC ?B;
.T O5O RA |.Z!T d;R v V@OY.
Nu ;E
Nu; ;ER ' kE! ^B Nu: ?OQ vS b#G /? b#; .T KO
Y. 8 NuG 0 V; gkOE* ET 0 V; }:R v V@OY.
:6. +e 8b "!-:
1. ;EOAB Nu; 1COJC@.
2. Nu ^:& -m ;E; )#JC@.
3. Nu ;E k- sZ! %CKOY. dLv 50: k- sZ& 3mUOY.
4. k- sZ!- Nu 3m; KdOJC@. 3m!B OC x#M _`Z! w
TGn V@OY. dLv 49B gkZ! 8T I <NgW; 3mUOY.
5. RAG URL!- Je! LL $vvv J: fl Nu! kQ gkZG VJ
d;; BNQ nO b|G URL; 1COE* TBOJC@.
6. L| 0 V; gkOv J8AB fl kH qO!- ET Km.rz 0 )
b& 1COJC@. *-GB pg WqL gkZG bh! {UUOY.
7. .N; )#E* }"; Y[ fl kR& )#JC@.
Nu 8b ;E
6w: NuL 8b 9$O ' gkZ!T s6* Oo fm& X_ OBv& a
$_@OY. b;*: 8b |! gkZ!T 30O; fmUOY.
-0 :6. +eG SGG NuL p 8b! I fl Nu ;E k- sZB g
kZ! ,sLp. @kANW%; C[R ' Xg Nu; %CUOY. %B Xg
Nui; *-Og W 3m; d`OB -i; .m V@OY. dLv 49B gk
Z! 8T I <NgW; 3mUOY.
&3e f} 21
1. Nu; KdOJC@. JdQ fl %C& 6$R v V@OY.
v "; .kO) %G `; 8Y 9L %COJC@.
v 8Y 9: %LM& 8b 'X - )b& 6$OJC@.
2. ;EOAB Nu; 1COm .N; )#JC@.
1CQ " Nu! kX Nu ;E k- sZ! %CKOY. dLv 45B k-
sZ& 3mUOY.
3. " Nu! kX k- sZ& OaOm .N; )#JC@.
V: n2 Nu5 1COv JB fl .N; )& ' k- sZ! &EKOY.
Nu kR
:6. +e 8b "!-:
1. kROAB Nu; 1COJC@.
2. Nu ^:& -m kR& )#JC@.
3. Nu kR k- sZ! %CKOY. dLv 51: k- sZ& 3mUOY.
4. k- sZ!- Nu 3m; KdOJC@. dLv 49B gkZ! 8T I <
NgW; 3mUOY.
5. kR g/!- Nu; kROB g/& 1COJC@. 42 dLvG :Nu k
R g/;B /?Q g/& *-UOY.
6. RAG URL!- Je! LL $vvv J: fl Nu! kQ gkZG VJ
d;; BNQ nO b|G URL; 1COE* TBOJC@.
V: gkZ! g| nOH D! L URL; ^R8g LM; gkO) Nu;
;8_@OY.
7. .N; )#E* }"; Y[ fl kR& )#JC@.
Nu qO 8b
:6. +e 8b "! GL |V0N Nu; %CUOY.
v gkZG Nu qO; 8Ai ; Nu G; )#JC@.
22 Trust Authority: gkZ H;-
v ?OQ :6. +eG Y% Nu qO; 8Ai b8 Nu G; )#JC@. (:
6. +e& ):!M x/Ov JB Q Y% Nu: Vv J; MTOY.)
%B " Nu! kQ b; $8& %CUOY.
v $8& 8b 'X Jd! {s -i L?OE* - )b& 6$OJC@.
v xOB fl Nu; 1COJC@.
G gLG L?
:6. +e 8b "!- vg %CGB G: Y% G8Y u `T %CKOY.
Q G!- Y% G8N L?OAi \v Y% G; )#JC@.
%G 8Y 9: ` %C
,sLp. @kANW% "L* Nu ;E k- sZ!- %G `; 8Y 9L
%COb 'X Y= _ n@ [w5 R v V@OY.
v %& -i L?O) _! `i; 8JC@.
v "L* k- sZ& .kO) %& 8Y 9L *8;JC@.
% - )b 6$
%G - )b& 6$OAi:
1. )b& 6$OAB -G fh! ?-& u8JC@.
2. 6l:& )#m ^JL* @%J8N xn - Jq& /fOJC@.
3. xOB Jq!- 6l: \_& u8JC@.
,sLp.& gkO) :6. +e |.
L =GG V&B :6. +e gkz /v8vG xk 8:)M |CO) 5rL
KOY.
&3e f} 23
Y% :6. +e -b
,sLp. @kANW%! W<:R '6Y :6. +e& 1OY. b; :6.
+eB !s :6. +eTOY. 0.{ :6. +e& .m VB fl |.ZB
gkZ& 'X ,sLp. @kANW%8N Q$R v V@OY.
L C!!- gkZ! v$Q Mz Y% :6. +eN [w; OAi:
1. ,sLp. @kANW%; >aOJC@.
2. gkZG 0.{ :6. +e& gkOAi pTOJC@.
3. ,sLp. @kANW%; YC C[OJC@.
4. :C!C -i!- .N; )#JC@.
:6. +e -b k- sZ! %CKOY. ,sLp. @kANW%8N Q$
GB :6. +eG qOL wTGn V@OY. dLv 50: k- sZ& 3
mUOY.
5. :6. +e!- -AB :6. +e& 1COJC@.
6. O#!- :6. +e O#& TBOJC@.
7. .N; )#JC@.
:6. +e 8b "L %CKOY.
:6. +e O# /f
V: L k- sZB gkZ! , !s :6. +e! kQ O#& /fR v V
T UOY. 0.{ :6. +e& .m VB fl :6. +eM T2 &xG
B H;-& |6OJC@. O# /f; 'Q 3m; &xOT KOY.
:6. +e 8b "!-:
1. :6. +e ^:& -m O# /f; )#JC@.
O# /f k- sZ! %CKOY. dLv 46: k- sZ& 3mUOY.
2. !s :6. +e! kQ vgG O#& TBOJC@.
3. u O#& TBQ Y= YC TBO) .NOJC@. 8 - 323G 5}Z .Z
& gkOG boOb 1T 8eJC@.
24 Trust Authority: gkZ H;-
V: O#B gkZ! TBR ' %CGv J@OY.
4. .N; )#E* }"; Y[ fl kR& )#JC@.
:6. +e nO $8 8b
:6. +e 8b "!-:
1. :6. +e ^:& -m nO $8 8b& )#JC@.
:6. +e nO $8 k- sZ! %CKOY. dLv 52B k- sZ& 3
mUOY.
2. k- sZ!- :6. +e 3m; KdOJC@.
3. OaGi .N; )#JC@.
,sLp. >a
,sLp. @kANW%; >aOAi:
1. k- sZ! -A VB fl k- sZG [w; OaOm .N; )#E* F
Oi kR& )#JC@.
2. :6. +e 8b "!- :6. +e ^:& -m >a& )#JC@.
&3e f} 25
26 Trust Authority: gkZ H;-
&4e $8
L =GG V&B nO, Nu W 8H Zx! kQ W<:! |CH 3d; $G
OE* 3mUOY.
nO
nO: Nu; E;OB MTOY. Trust Authority: Q !v LsG nO f}
; &xOg 6wG $%: n@ f}L gk !IQv vCUOY. Nu; d;
R Jd! V; ' % jslz& kX nO gD! W<:R v V@OY. nO
% dLv!- nO gD! ,aO) [:; OaOm &bR v V@OY. gk
ZG q{: Y= _ n2 MO v5 V@OY.
v nO 8:)! kqO) CA Nu; d;T.
v gkZ ZE; 'X jslz Nu; d;T.
v /$ -v GB e!! kQ Nu; d;T.
v PKIX Xv @kANW%! W<:Ob 'Q Nu; 'X gkZ ZEL* Y
% ):!& g| nOT.
_D! L gw: v):WLGG Trust Authority ,sLp. @kANW%!
{}Q $8& &xO) Nu; ^; v V@OY.
nO gDG %LMB nO b|(RA) |.Z! Trust Authority nO b| %:
)>(RA %:)>)!- < v VB %LM#L: 9ZeN L?UOY.
g|nO
Trust Authority; gkOi ANW%L* |.Z! e!G gkZ& g| nOR
v V@OY.
Nu; 'X Y% gw; g| nOOB fl )b! C*.@! V@OY.
v g| nOOAB 3N! kQ $8& TvX_ UOY. ggZNNM $8& T
vOE* %LM#L:G $8M 0: 6w 9Ze& gkR v5 V@OY.
© Copyright IBM Corp. 1999b 27
v % jslz!- nO dLv! W<:UOY. /0w ):!& g| nOOb
'Q nO gDL V@OY.
v 3Nz WiL xOB Nu /|! kX 3mOB $8& &xO) gD; O
:UOY. Y=! gD; &bUOY.
v d; sB& !KUOY.
g|nO d;L BNGi gkZB .#hG ID, O#, d;; BNQ RAG
URL n; ^T KOY.
v L $8& |-, |Z lm8N GB w" g|nOQ 3N!T |^UOY. 1
C{8N, WiG mG& 'X Y% d; $8! wTGn VB g|nO DO
; &xR v V@OY. ggZB Nu; d;R Xq! I ' gkZ! 8;
B Za& gkUOY.
gkZ! g| nOH ggZN fl )b! Nu; 9fOb 'Q C*.@! V
@OY.
v |-, |Z lm8N GB w" Nu; ;8Ob 'X JdQ $8& ^@OY.
gkZB .#hG ID, O# W d;; BNQ RAG URL; TvOE* FO
i g|nO DOz O#& TvOT I MTOY.
v ,sLp. @kANW%; gkO) Nu; d;UOY. d8! V; ' Tv
Q $8& &xUOY.
v Nu d;; 3.OB ?H gkZ! -0 :6. +e!- LL .m VB S
GG Nuz T2 d;L ,sLp. @kANW% "! *83OY.
v NuL XqGi ,sLp. @kANW%; kX 5^UOY. ,sLp. @k
ANW%: Nu; :6. +e! Z?8N zeUOY. %CB gkZ! Nu
; .m V=; *8@OY.
% jslz vx
Trust Authority: Y= % jslz !n% O*& kX nO gD; O:Om
&bO) nO d;; [:R v VT UOY.
v Microsoft Internet Explorer,1.: 4.0 Ls.
v Netscape NavigatorGB Communicator,v| 3.0 Ls.
28 Trust Authority: gkZ H;-
nO
nO: pvP Nu& 3NL* b8 #<<!T N)OB AN<:TOY. nO
! U- Trust Authority!- ANW%L* RA |.Z! nO d;8N &xH
$8& r!UOY. Y=! d;L N)Ggv HGgv#! Trust Authority RAB
nO %LM#L:! d;! kQ 9Ze& [:UOY. Nu& N)Ob 'Q a
$L ;Avi Trust Authority Nu b|(CA): Nu& _`UOY.
qnO: $%
ANW%L* RA |.ZB nO $8& r!R ' ON nO $8! 6wG qn
O: $%; {kUOY. ANW%L r!R v VB $8 /|: |.Z! r!
OB >y! qX z 9bUOY. *: VR sV bvM 0L $.XvB fbL
V@OY. Trust Authority; gkOi 6wL W/Q ANW%! $% $8& &
xR v V@OY. L ANW%: Z< r!!- L $8& gkUOY.
nO b|
Trust Authority!- RAB -v @kANW%TOY. RAB Y=; wTO) g
kZG nO! JdQ ON |. 8:)! kX %SL V@OY.
v gkZG Ex .N
v ;8Z! d;Q S:z c!N Nu; kfR Z]L VBv Ku
v Nu; [:OE* kROb 'Q d;; BN GB EN
v 8H @kANW%! W<:& C5OB ):!! Nu ;G xk 0M ,|H
3Nk 0& .m VBv Ku
nO %LM#L:
Trust Authority nO %LM#L:B nO 9Ze& zeUOY. nO %LM#
L:B IBM DB2®
Universal DatabaseN [:H |h| %LM#L:TOY. Trust
Authority: 9Ze& O#-UOY. Ov8, RA %:)>; kX xN RA |.
ZB kNPG nO $8& X6R v V@OY.
&4e $8 29
nO 5^N
" Trust Authority C:[: \O nO 5^N; .m V@OY. L 5^N: 6
w!- nO W Nuz ,|H qnO: $%, Nu $% W Zx; $GUOY.
Zx! W<:OAB gkZB Xg Zx! kQ 5^N! kX nOGn_ UO
Y.
RA -v RA.~n! 3!I ' 6wL nO @kANW%; 3$R v VT O
B A9Sv)! wTKOY. L RA.~nB nO b|L vxOB n2 pn*
$%5 gkR v V@OY. 5^N L', pn W 3! fN! nO @kANW%
! W<:Ob 'Q URL; |:UOY.
9& in, xk % -vG L'L MyPublicWebServerLm 5^N L'L
MyDomainN fl, nO @kANW%! W<:Ob 'X-B Y= URL; gk
OT KOY.
http://MyPublicWebServer/MyDomain/
Trust Authority C:[: nO @kANW%z T2 b; Java -v dLv
(index.jsp)& wTUOY. L dLvB nO 5^N! kQ URLN %CKOY.
nO -q:& &xUOY.
v e!G gkZB L % dLvN #F! Nu; d;Om ZEG jslz N
u; ;EOE* kRUOY.
v |.ZB Y% gkZ& g| nOOb 'X nO % dLv& f.R v5 V
@OY.
|.ZB nO 5^Nz ,|H nO d;z Nu |C [w; Ob 'X RA %
:)>! W<:UOY.
nO 9Ze
Nu! kQ " d;: Trust Authority RA! &bGB nO gDTOY. " n
O d;: nO %LM#L: 9ZeN MxKOY. L 9Ze! kQ w%L.B
d;! kQ pg 6!, Ivn d; ENnv ]5UOY. NuL [:GB fl
?OQ 9Ze! Xg Nu! |CH SGG L%.& ]5UOY. {s- nO 9
ZeB d;z ,|H NuG sLA gL,!- pg L%.& wTUOY.
30 Trust Authority: gkZ H;-
9Ze S:
nO %LM#L:! VB 9ZeG S:: nO d;; 3mOB /vTOY. O
aH d;G fl /vB N)H Nu5 3mUOY. b8 S:: 6wL qnO:
$%; }`OB % 5r; VB 3. /vTOY. 9: S:z W *: RA %:
)>; kX RA |.Z! .NR v V@OY.
Nu
Nu: #<<* 3N; 'X pvP Nu& [:OB MTOY. Trust Authority
G fl Nu: nO d;; r!Om BNQ LD!8 _}UOY. nOG az
N Nu b|(CA): Nu; _`UOY. Trust AuthorityG fl _`GB Nu
G /|L 6wG qnO: $%z O!UOY.
Nu b|
Trust Authority!- CAB 6wG $%z O!O) pvP Nu; _`R %SL
VB -v ANW%TOY.
Trust Authority: s# EZOB CA! Nu:G uEN VfG Nu; BNO
B % ?GOB s# Nu; vxUOY. Trust Authority: CA h~5 vxU
OY. CAB h~!- s'! VB CA& EZOg Nu:G uEN L CAG N
u; BNUOY.
Nu kR qO
Trust Authority RAB $b{N #]8N Nu kR qO(CRL); _`UOY.
CRL: u Ls /?Ov JF Nu; &bOB R/Z! Nu^v xOB Nu
; qO8N *-UOY.
SGG CA, RA GB @kANW%L NuL kRGzBv )N& a$Ob 'X
L qO! W<:R v V@OY. LML gkZ! 6wG 8H @kANW%! W
<:OAm R ' Trust Authority RA! 8H; &xOB Q !v f}TOY.
&4e $8 31
p:d.
Trust AuthorityL Nu; zeOb 'X gkOB p:d.B IBM SecureWay
p:d.TOY. L p:d.B 6wL /w Trust Authorityz T2 gkOb '
X 3$Q MO v5 V@OY. FOi gkZ! L|! 3!O48g Y% @k
ANW%z T2 gkOB p:d.O v5 V@OY.
Trust AuthorityL p:d.! W<:Ob 'X gkOB ANd]: f. p:d
. W<: ANd](LDAP)TOY.
8P L'
8P L'(DN): pvP Nu! kQ p:d. WqG Q dRTOY. DN: p
:d.G h~ 86!- WqG '!& m/OT D0UOY.
Nu
Nu: Nu R/ZG Ex; 8uOB CA! GX -mGB pvP Z] um-
TOY. R/ZB Y% gwz %LM& Vm ^; ' GB 8H @kANW%!
kQ W<:& d;R ' Nu; Nu8N gkR v V@OY. Trust Authority
!- -v, @kANW% W A0MM :6. +e 0: e!nv gkZM s#
#! Nu; ^b 'X Nu; .m Vn_ UOY.
Trust Authority: Y= |V!- X.509v3 Nu; vxUOY.
v jslz Nu
v -v Nu
v e! Nu
v PKIX Xv @kANW%! W<:Ob 'Q Nu
v CA! kQ s# Nu
Trust Authority: Y= ANd]i5 vxUOY.
v SSL
v S/MIME
v IPSec
v PKIX CMP
32 Trust Authority: gkZ H;-
b; Trust Authority 3!B L/Q |VM ANd]! bJQ YgQ Nu /|
; &xUOY. nOZB ZEG d8& f7C0B Nu; d;R v V@OY.
40 dLvG :&x Nu /|;: Nu /|! kX 3mUOY.
jslz Nu
jslz Nu: O]{8N % jslz! GX O#-H DON zeGB pv
P Z] um-TOY. ON @kANW%: gkZ! :6. +e* Y% E<!
0& zeR v VT UOY. Trust Authority C:[!- gkZ! % jslz
& kX w" jslz Nu; d;R v V@OY. _D! JdQ fl nO %
dLvN 9F! Xg Nu; ;EOE* kRR v V@OY.
CA Nu
Trust Authority -v! &bR Nu; .m VB pg jslz, -v, e! G
B @kANW%: #/GB CA Nu5 .m Vn_ UOY. L Nu: Trust
Authority CA! GX _`GB Nu; .m VB -vMG kE; NuOb '
X JdUOY.
8H Trust Authority nO -q:& gkOb 'X jslz! Trust Authority
CA Nu; .m Vn_ UOY. 3=8N Trust Authority nO % dLv& f
.R ' L Nu; r; v V@OY. W D! nO -q:NNM Nu; d;R
'6Y #/GB s@OB CA Nu; YnNeR v V@OY.
9& in, 2b SSL jslz Nu; d;OB fl Xg Nuz #/GB CA
Nu; ^; v V@OY.
V: NetscapeG Jb 1.:B Trust Authority -v! GX &bGB gL. N
u; vkR v Vz@OY. L Nu: Xg -vMG -v Nu W ,sLp
. Nu kE pN! kX ck !I_@OY. Ov8, NetscapeG VE 1.
:B ,sLp. Nu <G! kX CA Nu; d8UOY.
&4e $8 33
-v GB e! Nu
LML gkZG [wG ONN fl -v* e!! kQ Nu; d;R v V@
OY. % jslz& kX &xGB nO gD; gkOJC@.
Nu; d;OB -v GB e!B PKCS #10d; gD; gkO)_ UOY.
Nu .e
Nu .e: X.509v3 NuG |D!- 1C{N dRTOY. .e: _! Je&
Nu8N kUOB M; !IOT UOY. Trust Authority: 6wL _`OB N
u; gkZ $GR v VT Ob 'X Nu .eG Wl; &xUOY. L _!
{N JeB qnO: AN<: /vN KA. V@OY.
Nu sLA gL,
Nu& d;R ' Xg Z] um-G /? b# ?H vSGB sLA gL,;
3CUOY. L sLA gL,: Nu! kRGE* 8b! I ' >aKOY.
NuL ;EGB fl ET 9Ze! nO %LM#L:! [:KOY.
;E !I:
NuG ;E !I:: RA |.Z! gkZ& 'X RA %:)>!- /fR v
VB /:G O*TOY.
v NuL ;E !IQ fl 8 NuL )|w ?BL VB ?H ET Nu; E
;R v V@OY. ;E !IQ Nu; R/Oi nO AN<:M nO [wL
\x- KOY.
– ;E !IQ jslz Nu; .m VB fl nO % dLv!- ;E; d
;R v V@OY.
– PKIX Xv @kANW%! W<:Ob 'Q ;E !IQ Nu; .m VB
fl ,sLp. @kANW%; gkO) ;E; d;R v V@OY.
v NuL ;E R!N fl!B 8b! I 'nv bY0 D! )|w NuL J
dQ fl! YC nO; X_ UOY. nOR 'B 6! 3= nOOB M3
3 pg $8& &xX_8 UOY.
34 Trust Authority: gkZ H;-
8H Zx W<:
L =GG V&B NuG gk W |.! |CGn V@OY.
W<: &n
W<: &n qO(ACL): ;N Trust Authority gkZ, e! W RA.~n&
Nu W GQ N)UOY. 9& in, RA %:)> vx -m4: RA |.Z!
RA %:)>! W<:R v Vb |! ACL; gkO) nO b| |.Z& N
uOm GQ; N)UOY.
Nu W GQN)
Nu: Ex um; &xOB ]i GQN)B +p!& Ob 'Q GQ; &xU
OY. Trust Authority: gkZ! 8H @kANW%! W<:Ob |! 6wL
Nuz GQN) pN& -dR v VT UOY. Nu R/ZB ZEL gk _N
@kANW%L H|OYm .ER v V@OY.
pvP -m
NuG Q !v& gkO) pvP -m8N DO; -mR v V@OY. L8T
Oi gkZ! -mQ LDN ;kL /fGzBv )N& DO; )B )8!T
* KA ]OY. -m: DOG ;k; O#-OvB J@OY.
:6. +e
:6. +eB pvP Z] um-G 8H; /vOb 'Q ze e!TOY. g
kZG v):WLG! sVOB !s :6. +e! Vm ;N GB \NG 0.
{ :6. +e! V@OY. \N :6. +eB bh!- bhN !.% v Vv
8 ^kR v Vb '.! z H|UOY.
,sLp. @kANW%; gkO) ET Nu; ^B fl, Nu: gkZ! ,
:6. +e! Z?8N zeKOY.
&4e $8 35
36 Trust Authority: gkZ H;-
&5e |6gW
L =GG V&B Je 3m, /?Q Je * W Nu S:G GL& wTUOY.
% dLv nO gD
nO gD: e!G Nu R/Z! kX bzOm Nu d;; 3mOb 'Q =
G; wTOm V@OY. =GG ON JeB /$ nO /|G fl!8 &xK
OY.
V: 6w!- nO gD; gkZ $GOB fl ;kL L H;-! VB Mz
YR Y& v5 V@OY.
nO $8B Nu d;G /|! {UQ Y= Jei; wTUOY.
Nu /|
qO!- *; 1COJC@. 40 dLvG :&x Nu /|;: b; 3!
N &xGB Nu /|; 3mUOY.
L' gkZG L'. xOB fl _# L'L* S.[Z& wTUOY.
g|nOG fl LM: gkZ! g|nOOB gw; p^UOY.
: gkZG :.
g|nOG fl LM: gkZ! g| nOOB gw; p^UOY.
|Z lm VR
'!& *8;B b#(@)M SGG !(.); wTOB |Z lm VR. 8
H |Z lm; 'Q Nuz 0: ON Nu /|: L VR& d8UO
Y. |Z lm kv& 1COAi |Z lm VR& &xX_8 UOY.
|Z lm kv
nO d;G az! kQ |Z lm kv& ^8Ai L IG; 1COJ
C@.
© Copyright IBM Corp. 1999b 37
5| zG
gkZ!T /0Q z.8N gkZG Ex; NuOE* ):! gkZ
N !eOB M; fvOb 'X gkI v V@OY. nO d;G sB
& !KR ' L z.; ^T KOY. gkZB d;L gkZ! kQ M
Nv, -v* e!! kQ MNv GB ):!& g| nOOB MNv )
N! |Q 5| z.! @dX_ UOY.
5| @d
gkZ! &xQ 5| z.! kQ @d. boOb ,n @d; &xOJ
C@. d; sB& !KR ' ?OQ @d; &xX_ UOY.
V: @d: kR.Z& 8PUOY.
O# (g|nO8 Xg) gkZ! g| nOOB gwL Nu; YnNeR X
q! I ' ,sLp. @kANW%8N &xX_8 OB O#. .Z A-Z,
a-zM 0–9& gkOJC@. O#B 8 - 32 .Z& wTR v V@OY.
O#& &xOv JB fl nO @kANW%: gkZ& 'X 103G .
ZN H O#& }:UOY. g|nO d;G BN C .#hG ID& T
2 vIOT KOY.
O# .N
(g|nO8) ?OQ O#& YC TBOJC@.
Nu d; $8B Y= Je& wTUOY.
PKCS #10 Nu d;
(-v GB e! nO8 Xg) gkZ! Nu; d;OB -v* e!!
GX }:GB PKCS #10Nu d;G ;k. d;L DO! zeH fl
Windows NotepadM 0: X:. m}b!- DO; )JC@. ;k; 9
gO) nO gDG X:. sZ! Y)V8JC@.
8k L'
L Nu; .NOb 'Q L'.
v 3NG fl O]{8N W 3NG :mTOY.
v -v* e!G fl!B k3 #:. L'TOY. PKCS #10Nu d
; Je! #:. L'L xB fl L *; &xX_ UOY.
38 Trust Authority: gkZ H;-
0 )b
(Netscapejslz nO8 Xg) xk/3Nk 0 V! kQ 0 )b. *
; 1COJC@. 0! ,vO 8Y H|Ov8 ?C! 8H <G! ,a
Ob 'X JdQ C#L u!UOY.
O#- -q: &x
(Internet Explorerjslz nO8 Xg) xk/3Nk 0 V; }:Ob
'Q O#- -q: x^Z. *; 1COJC@. 0! ,vO 8Y H|O
v8 ?C! 8H <G! ,aOb 'X JdQ C#L u!UOY.
b;*: 512q.G 0 O#-& &xOB Microsoft Base Cryptographic
ProviderTOY.
C:[! 3!GB fl Microsoft Enhanced Cryptographic ProviderB
1024q.G 0 O#-& &xUOY.
0 <.
(Internet Explorer jslz nO8 Xg) gkR 0 V. ET 0 <.
}:; 1COE* qO; -m b8G 0 V _!- O*& 1COJC
@.
ET 0 <. L'
(Internet Explorerjslz nO8 Xg) }:I ET 0 VG L'. L
Wq; xi8N 2\ Nm L'! kX [Nz m/ D0Z(GUID)& }
:R v Vv8 L8T Oi 0 V; NDOb! 8Y nFT KOY.
_! 8H IG
Microsoft Internet Explorer! gkZG ET 0 V; 'X &xOB _
! 8H. L IG; 1COB fl % jslzB gkZ! L nO gD
; &bQ D! oC L IGi; 3$Ob 'Q Internet Explorerk-
sZ& %CUOY.
6w L'
}{8N nOH 6wG L'
6w \'
Ngz* RA.~n 3_z 0: z GB N-G L'.
&5e |6gW 39
8*(?/>/i)
6wG VR
v*(8/:/C)
Chicago GB ParisM 0: 6wL '!Om VB 5C GB vZ<.
C/5 6wL '!Om VB C/5. C/5G L'; }+Ov Jm |N 2Bv
GB %X `n& gkOBvG )NB nO @kANW%! {s Y(O
Y. 9& ii, New York GB NY& gkOJC@.
9! 6wL '!Om VB *s. *; 1COJC@.
5^N L'
nO 5^NG L'. TBOsB vC! VB fl &xOJC@. 9& i
i, mypc.mydiv.mycorp.com.
&x Nu /|
Trust Authority C:[: vxGB Nu |VM ANd]! kQ 9vG Nu /
|; &xUOY. /f gW!B Y% /? b#L wTKOY. NuG L': s
6* @! /?QvM 0G Vd gk! kQ %CbTOY. YgQ bIG 3m
; 8Ai kn}; |6OJC@.
CA s# Nu
s# Nu; 8/OB CA! Nu; _` CA! GX EZ ^; v VT
UOY. Nu: pvP -mz NN @b& &xUOY.
1–2–b %LM O#-
R/Z! %LM& O#-R v VT UOY. Nu: Y% q{8N gk
Gv J@OY.
1b W 2b E-mail 8#
R/Z! S/MIME(Secure Multi-Purpose Internet Mail Exchange)A
Nd]; gkR v VT UOY. L ANd]: |Z lmL* b8 mime
@j'.& 8#UOY. b3G Nu, ^Cv +a:, b3G NN @b W
bP:; &xUOY. V> gkZ& 'Q ||{N 1CTOY.
40 Trust Authority: gkZ H;-
1-2b IPSec
NM] ANd] P68N NM] s!- 8;vB %LMG +a:z b
P:; 8eUOY. IPSecNu: gkZ8YB %LM& 'Q MLg, >
> slM! v$KOY.
1-2b 0 O#-8
R/Z! 0& O#-R v VT UOY. Nu: Y% q{8N gkGv
J@OY.
1-2b NN @b
^CvG b3 NN @b* |^G NN @b& fvOb 'X ^Cv O
#-M pvP -m bI; &xUOY.
1-2b -m8
R/Z! DO; pvP fD8N -mR v VT UOY. Nu: Y% q
{8N gkGv J@OY.
1b W 2b % ,sLp. Nu
% jslz! ,sLp. Nu SSL <G! |)R v VT UOY. L
Nu8N jslz gkZB /$ 8H % gL.! W<:R v V@O
Y. Nu: pvP -m, NN @b W 0 O#-& &xUOY. V> g
kZ& 'Q ||{N 1CTOY.
1b W 2b % -v Nu
-v! -v Nu SSL <G! |)R v VT UOY. Nu: pvP -
mz 0 O#-& &xUOY.
Y% ):!& 'X g|nOOB nOZ* gw: {UQ Nu /|; d;R v
V@OY. nO gD: Nu /| Je! gk !IQ Nu /|; *-UOY. ,
sLp. @kANW%!- Nu 3mG k5 JeB Nu /|; *-UOY.
V: gkZ! 8B qOL L qOz O!Ov J; v5 V@OY. 6wL L'
L* Ivn &x Wqnv /f_; v V@OY.
&5e |6gW 41
Nu kR g/
Nu; kRR ' W8T Ob 'Q g/& 1CX_8 UOY. Y=: Nu; k
RR ' 1CR v VB /?Q g/iTOY.
CA 0! UsJ
Nu; _`Q Nu b|G 0! UsGz@OY.
NuL k<J
ET Nu; .T Gn u Ls L NuL JdOv J@OY.
g/ x=
g/& v$Ov Jm V@OY.
VJ gkL u Ls /?Ov J=
VJ k5& 'X u Ls Nu; JdN Ov J@OY. 9& in, Nu
L _`H ZxL* @kANW%! u Ls W<:R Jd! x@OY.
gkZ /f !T
NuL {kGB 6wz u Ls |h! x@OY.
gkZ 0 Us
gkZG 3Nk 0! UsGz@OY.
V: Y= g/N kR 6!! v$gWL _}UOY.
Nu 8y
Nu; 58{8N kROb8YB q0:-Ob 'Q d;; UOY. N
u; YC gkR Xq! Gi RA |.Z!T NuL YC ?B; .T
G5O d;OJC@. Ov8, NuL CRL! bgGn VB ?H 8b!
GB fl!B YC ?B; .T R v x@OY.
V: nO gD: gkZ! nO % dLv!- Nu; kRR ' g/ Je! /
?Q g/& *-UOY. ,sLp. @kANW%: Nu kR k- sZG
kR g/ Je! L g/i; *-UOY. dLv 22B k- sZ& 3mU
OY.
42 Trust Authority: gkZ H;-
,sLp. @kANW% b; "
,sLp. @kANW%G pg Vd bI; IBM SecureWay Trust Authority
!- gkR v V@OY: :6. +e 8b ".
:6. +e 8b "G ^:
Y= ^: IGi; :6. +e 8b "!- gkR v V@OY. 9: IGiL
^: F!! VB N 3G GG %!- Uz Nu; 1CO5O d8Om V@O
Y. Nu; 1COAi %!- Xg `; )#JC@.
:6. +e ^:
O# /f
-0 :6. +eG O#& /fUOY.
nO $8 8b
-0 :6. +eG nO $8& >OY.
>a ,sLp. @kANW%; >aUOY.
Nu ^:
ET g|nO %LM& gkO) ET Nu; d;UOY.
v .#hG ID
v g|nO DO
-b 1CH Nu! kQ $8& >OY.
]T 1CH Nu; :6. +eN ]TUOY.
]b :6. +e!- 1CH Nu; ]bUOY.
h& :6. +e!- 1CH Nu; h&UOY.
;E 1CH Nu; ;EUOY.
kR 1CH Nu; kRUOY.
5r;
&5e |6gW 43
L "! kQ 5r;
vg "! |Q 5r; 5).
5r; V&
Trust Authority gkZ H;-& %CUOY.
$8 ,sLp. @kANW%! kQ $8& %CUOY.
:6. +e 8b "G G
^: %CY F!! "L N 3G G; .m V@OY.
; Nu G
-0 :6. +eG vgG pg Nu; *-OB %M ET Nu d;z
kR d; 0: 8y d;; %CUOY.
b8 Nu G
?OQ -0 :6. +e! Vv8 gkZ!T SOvB JB Nu; *
-OB %& %CUOY.
:6. +e 8b "G %
:6. +e 8b "G " G: :6. +eG Nu; 3mOB %& wTOm V
@OY. " `: \O Nu; 3mUOY. -i: Y= $8& &xUOY.
sB NuL* Nu d;G sB. *: Y=; wTUOY.
_` RA! Nu; _`O48g ,sLp. @kANW%L Nu; :
6. +e! zeO4@OY.
EN RA! Nu d;; EN_@OY.
;E &b
;E d;L RAN 8;3@OY.
kR &b
kR d;L RAN 8;3@OY.
&b Nu d;L RAN 8;3@OY.
9Lm :6. +eG Nu! N)Q L'.
44 Trust Authority: gkZ H;-
V< L'
NuG 8P L'.
k5 NuG Vd k5.
8b OZ
NuL u Ls /?Ov J: OZ.
,sLp. @kANW% k- sZ
,sLp. @kANW%: gkZ! Nu |C [w; R ' <NgW; v$R
v VB k- sZ& &xUOY. :6. +e 8b "G ^:!- " 8:)&
C[Og ,sLp. @kANW%: 8:)! {}Q k- sZ& %CUOY.
Nu ;E k- sZ
L k- sZ!- 6wL 3$OB #] ;! 8b 9$N " Nu! kQ d`
$8& < v V@OY. b;*: 30OTOY. k- sZG %B ""G 8b N
u! kQ `; .m V@OY.
-i: Y= $8& &xUOY.
9Lm :6. +e sG NuG 3m{N L'.
OC x#
NuG OC x#.
k5 NuG Vd k5. L JeB Nu /|; wTUOY. 40 dLvG :&
x Nu /|;: b; 3!& 'X vxGB /|; *-UOY.
8b OZ
NuL /?Q V> OZ.
L Nu !n% O* Ls; ;EOAi d` $8& KdOm, Nu; 1COm,
.N; )#JC@. F+ M5 1COv JB fl .N; )#i k- sZ! ]
|OY.
|C V&:
&5e |6gW 45
23 dLvG :%G 8Y 9: ` %C;
23 dLvG :% - )b 6$;
O# /f k- sZ
L k- sZ!- !s :6. +e! kQ O#& /fR v V@OY.
V: 0.{ :6. +e! kQ O#& /fOAi :6. +eM T2 &xH R
A.~n& gkX_8 UOY.
vg O#
!s :6. +e! kQ vgG O#& TBUOY.
ET O#
gkOAB u O#& TBOJC@. A-Z, a-zM 0–9& gkO) 8 - 32
3G .Z& v$R v V@OY.
O# .N
?OQ u O#& YC TBUOY.
Nu h& k- sZ
L k- sZ!- gkZ! h&& 'X 1CQ Y= _ Q !v! kQ d` $
8& KdR v V@OY.
v -0 :6. +e!- h&OAB Nu.
v gkZ! &b_v8 RA! 3.Ob |! kROAm OB 8y d;. 8y d
;: n2 :]G M5 I v V@OY. Ivn Nu; h&OE* kROb '
Q d;L I v5 V@OY.
1. NuL* d;; 3mOB $8& KdOJC@. dLv 49B gkZ! 8T
I <NgW; 3mUOY.
2. )|w Wq; h&OAB fl .N; )#JC@.
V: h&OAB 8y d;L %CGv JB fl u Ls 8y _L FQ MLg
h&Ob!B J+ J: MTOY.
46 Trust Authority: gkZ H;-
Nu ]b k- sZ
L k- sZ!- -0 :6. +e!- DON Nu; ]bOb 'X JdQ $
8& &xUOY.
O#- /|
DO! kQ O#-G 9'; 1CUOY. 8Y -BQ O#-B um +
0& d8Og 8H ,a; [:Ob 'X 8Y 9: C#L RdKOY.
DO L'
:6. +e!- ]bR ' Nu; zeOb 'Q fNM DO L'; v
$OJC@. #F8b \_& gkOi DO L'; TBOb |! fN&
1CR v V@OY.
DO O#
DO! kQ O#& v$O) DO; 8#UOY. 8 - 323G 5}Z .
Z(A-Z, a-z, 0-9)& gkR v V@OY.
Nu ]T k- sZ
L k- sZ!- DO!- -0 :6. +eN Nu; ]TOb 'X JdQ $
8& &xUOY.
DO L'
NuL wTGn VB DOG fNM DO L'; v$UOY. #F8b \
_& gkOi fNM DO L'; TBOB kE 1CR v V@OY.
DO O#
DO; 8#OB O#& v$UOY.
9Lm 3m{N L'; TBO) :6. +eG Nu; D0OJC@.
g|nO DO gk ET Nu k- sZ
L k- sZ!- gkZ& g| nOQ |.ZNNM ^: g|nO DOz O
#& v$O) Nu; 'X nOR v V@OY. g|nO DOz O#& |Z l
mL* p:O8N ^; v5 V@OY.
&5e |6gW 47
g|nO DO L'
^: g|nO DOG fNM DO L'; v$UOY. #F8b \_& g
kOi fNM DO L'; TBOB kE 1CR v V@OY.
O# Nu; ;8Ob 'X ^: O#& TBUOY.
9Lm 3m{N L'; TBO) :6. +eG Nu; D0OJC@.
O#& TBQ D! 6wG 1C! {s Nu d;z ,|H S:z *G %C&
< v5 V@OY. ON S:z *: m}R v5 V@OY.
.#hG ID& gkOB ET Nu k- sZ
L k- sZ!- gkZ& g|nOQ |.ZNNM ^: .#hG $8& gk
O) Nu; 'X nOR v V@OY. L $8& |Z lmL* |-N ^R;
v5 V@OY.
k- sZ! Xg $8& &xOJC@.
.#hG ID
ET Nu; [:Ob 'X ^: .#hG ID& TBUOY.
O# Nu; ;8Ob 'X ^: O#& TBUOY.
RAG URL
L JeB .#hG IDM O#& &xOB M! kQ kHTOY. qO!
- ^: Mz O!OB URL; 1COE* X:. sZ! TBOJC@.
9Lm 3m{N L'; TBO) :6. +eG Nu; D0OJC@.
0 Km.r
L Nuz ,|GB 3Nk 0& 'X gkOB 6wL &H_x O#-
Km.r; 1COJC@. qOG *i: gkZG bh! {UUOY. 0
)bM uRn L Km.r: 0G -5& $GUOY.
0 )b
L Nuz ,|GB 3Nk 0G )b& 1COJC@. qOG *i: g
kZG bh! {UUOY. 0! fvO 8Y H|Ov8 ?C! 8H <
G! ,aOb 'X JdQ C#L u!UOY.
48 Trust Authority: gkZ H;-
Nu -b k- sZ
L k- sZ!- gkZ! :6. +e 8b "!- 1CQ NuL* Nu d;
G <NgW; < v V@OY.
3m: =G8N <PKOY. =G!B O] $8, V< $8 W _`Z $8! w
TKOY. Nu d;! kQ $8B NuG $8M YR Y(OY. 9& in, N
u d;: OC x#& .m Vv J@OY.
O] $8B Y=; wTUOY.
9Lm gkZ! , NuL* Nu d;G L'.
OC x#
NuG OC x#.
sB NuL* Nu d;G sB.
/? OZ
NuL ?B; .T GB OZ.
k5 NuG Vd k5.
0 Km.r
Nuz ,|H 3Nk 0! kQ O#- Km.rG D0Z. 0 )bM u
Rn L Km.r: 0G -5& $GUOY.
0 )b
Nuz ,|H 3Nk 0G fL.
|Z lm VR
gkZG NM] |Z lm VR.
V< $8B NuL _`H #<<! kQ Y= $8& wTUOY.
8k L'
Nu R/ZG L'.
6w \'
Nu R/Z! SOB qnO: \'.
&5e |6gW 49
6w L'
Nu R/ZG 6w.
v*(8/:/C)
Nu R/ZG C/5.
9! Nu R/ZG 9!.
_`Z $8B Nu; _`Q CA! kQ Y= $8& wTUOY.
8k L'
Nu; _`Q CAG Ex.
6w \'
_`Z! SOB qnO: \'.
6w L'
_`ZG 6w L'.
v*(8/:/C)
_`ZG C/5.
9! _`ZG 9!.
:6. +e -b k- sZ
L k- sZ!- ,sLp. @kANW%z T2 gkOAB :6. +e& q
O!- 1CUOY.
:6. +e
qO!- :6. +e& 1CUOY.
O# gkZ! 1CQ :6. +e! kQ O#& TBUOY.
Nu ;E k- sZ
L k- sZ!- Nu! kQ d` $8& KdO) Nu; ;EOAB M; .
NR v V@OY.
50 Trust Authority: gkZ H;-
Nu; ;EObN a$OB fl kE! ^B Nu: ?OQ vS b#G /?
b#; .T KOY. 8 NuG 0 V; gkOE* ET 0 V; }:R v V@
OY.
;E; hSOAi Y=; &xOJC@.
RAG URL
Je! g|! $vvv J: fl VJG Nu d;; BNQ RAG URL
; 1COE* X:. sZ! TBOJC@. URL; Kv xOB fl n
O |.Z!T .GOJC@.
0 Km.r
8b Nu!- 0 V; gkOAi L Je& +COJC@. ET 0 V;
}:OAi *; 1COJC@. qOG *i: gkZG bh! {UUO
Y.
LM: L Nuz ,|GB 3Nk 0! kQ O#- Km.rTOY. 0
)bM uRn L Km.r: 0G -5& $GUOY.
0 )b
8b Nu!- 0 V; gkOAi L Je& +COJC@. ET 0 V;
}:OAi *; 1COJC@. qOG *i: gkZG bh! {UUO
Y.
LM: L Nuz ,|GB 3Nk 0! kQ )bTOY. 0! fvO 8
Y H|Ov8 ?C! 8H <G! ,aOb 'X JdQ C#L u!U
OY.
Nu kR k- sZ
L k- sZ!- Nu! kQ d` $8& KdO) Nu; kROAB M; .
NR v V@OY.
kR& hSOAi Y=; &xOJC@.
&5e |6gW 51
RAG URL
Je! g|! $vvv J: fl VJG Nu d;; BNQ RAG
URL; 1COE* X:. sZ! TBOJC@. URL; Kv xOB f
l nO |.Z!T .GOJC@.
kR g/
Nu; kROAB g/& D0Ob 'X Y= _!- 1COJC@.
v gkZ 0 Us
v CA 0! UsJ
v gkZ /f !T
v NuL k<J
v VJ gkL u Ls /?Ov J=
v Nu 8y
v u Ls gkGv J=
42 dLvG :Nu kR g/;B L g/i; $GUOY.
:6. +e nO $8 k- sZ
L k- sZ!- -0 :6. +e! kQ $8& KdR v V@OY.
:6. +e
:6. +eG L'.
PKCS #11 v|
PKCS #11O#-G 9'.
CDSA v|
O#-M %LM ze [wC! gkOb 'X :6. +e! 3hGB x
k %LM 8H F0X3G 9'. qO8N *-GB M8Y L| v|G
CDSA& G`OB :6. +e RA.~nM T2 L :6. +e& g
kR v x@OY.
:6. +eG \) x#
Nuz Nu d;; zeOb 'Q \) x#G g.
52 Trust Authority: gkZ H;-
,sLp. @kANW%! kQ 5r;
,sLp. @kANW%: Y= NyG 5r;; &xUOY.
v :6. +e 8b ": Y=; wTOB 5r; ^:& .m V@OY.
5r; V&
Trust Authority gkZ H;-& %CUOY.
L "! kQ 5r;
vg "! |Q 5r;; %CUOY.
v " k- sZB 8:)! /$Q 5r;; &xOB 5r; \_& .m V@
OY.
v " JeB ?-! Je 'N L?R ' < v VB .F (vD 5r;; .m
V@OY.
|C V&:
23 dLvG :G gLG L?;
&5e |6gW 53
54 Trust Authority: gkZ H;-
VGgW
L %G $8B L9!- &xGB &0 W -q:& 'Q MTOY. Y% *s!
-B L %! p^H &0, -q: GB bIiL &xGv J; v5 V@OY.
vg Xg v*!- gkL !IQ &0 W -q:! kQ $8B IBM 5wk%
!T .GOJC@. IBM &0, ANW% GB -q:& p^_Ym X- Xg IBM
&0, ANW% GB -q:8 gkR v VYB GLB FUOY. IBMG v{ g
jG; 'XOv JB Q bIs ?nQ Y% &0, ANW% GB -q:& kE
gkR v V@OY. W/*, IBMg L\G &0, ANW% GB -q:& gk
R ' W [?; r! W KuOB M: gkZG %STOY.
IBM: L %!- mGGB V&! kX /c& .m VE* vg bx _O v
V@OY. L %; &xOB ML /c! kQ gkG; N)OB M: FUOY.
gkG! |X-B -i; kX F! VRN .GOG v V@OY.
150-010
-o/0C 5nw8 )G5? 25-11, Qxty
Q9 FL.q.% VD8g
v{gjGN
2YL.(DBCS) $8! kQ gkG! |X-B Xg v*G IBM v{gjGN
N .GOE* -i; kX F! VRN .GOJC@.
IBM World Trade Asia Corporation Licensing
2-31 Roppongi 3-chome, Minato-ku
Tokyo 106, Japan
Y= ;k: 59 W Xg v* }T! O!Ov JB 9!!B {kGv J@O
Y. IBM: n0Q >yG mC{ GB OC{ 8u xL L %; :vskN; &
xUOY. )b!B /$ q{zG {U: GB GE !I:, q'X n! kQ O
C{ 8uL wTG* L! 9QGB M: FUOY. ON 9!!-B /$ E!
! Vn- mC{ GB OC{ 8uG wb! ckGv J; v5 V@OY. {s
- L ;kL gkZ!T {kGv J; v5 V@OY.
© Copyright IBM Corp. 1999b 55
L %!B bzsG N$.:L* bGsG @y! V; v V@OY. L %G $
8B $b{8N /fGg, /fgW: 3$G! kUKOY. IBM: g| kv x
L p&s5 L %!- 3mOB &0 W ANW%; /fOE* 31R v V@
OY.
L %!- |6Q IBM L\G % gL.B \v mG& 'X &xH MLg X
g % gL.& _5Ob 'Q ML FUOY. Xg % gL.G ZaB ; IBM
&0; 'Q ZaG ON! FOg W/Q % gL.& gkOB M: gkZ ;
NL 1CR .&TOY.
IBM: m4L &xOB $8& m4!T n0Q G+5 N)Ov Jm {}OY
m }"OB fD8N gk GB PhR v V@OY.
(i) 6Z{8N [:H ANW%z(L ANW%; wTO)) b8 ANW% #G $
8 3/, (ii) 3/H $8G s# gk nG q{8N L ANW%! kQ $8&
xOB gkGZB F! VRN .GOCb YxOY.
150-010
-o/0C 5nw8 )G5? 25-11, Qxty
Q9 FL.q.% VD8g
RA.~n gw;N
L/Q $8B gka n; qTX- Xg b# W 6G! {s gkL !IUO
Y.
L %!- 3mOB gkG ANW%z W/Q ANW%; gkR v VB pg
gkG Zai: IBM m4 h`-, IBM 9& ANW% gkG h`- GB L
M ?nQ h`6GO!- IBM! GX &xKOY.
)b! wTH :I ZaB &nH /fO!- x$Gz@OY. W/GN b8 n
5 /f!- r: azM )T Y& v V@OY. ON x$*: 3_ \h C:
[!- r: MO v V8g, L/Q x$*L O]{8N gkR v VB C:[
!-5 0; MLsm 8eR v x@OY. S8 FOs, ON x$!B _$; k
X r: MLGN G& *z Y& v V@OY. L %G gkZB /$ /f! X
gGB Za& .NX_ UOY.
56 Trust Authority: gkZ H;-
IBM &0 L\G M! |Q $8B Xg &0G &6w< W b#0, W\ gk
!IQ xD R:& kX 8Q MTOY. IBM: IBM &0L FQ Mz |CH
R8gWL* :I W #/: .&! kX-B 8eOv J8g WM 0: &0:
W:.Ov JR@OY. IBM &0L FQ &0G :I! kQ .GB Xg &6
w<N OJC@.
IBMG bD fbL* G5! |Q xmB g| kv xL /fGE* 68I v
V8g LB \v q{L* q%& &COB M! v*v J@OY.
%CH pg IBM &0G !]: IBMG Ge RqZ !]LZ C<Lg g| k
v xL /fI v V@OY. E! !]: YgR v V@OY.
s% W -q: s%
Y=: L9 GB b8 9!! nOH IBMgG s%TOY.
IBM
AIX
AIX/6000
DB2
DB2 Universal Database
SecureWay
WebSphere
Trust Authority ANW%(″ANW%″): DB2 Universal DatabaseG )/ NP
; wTUOY. Y% %LM |. q{; 'X-! FQ ANW%! GX gkG
E* }:GB %LMG zez |.& 'X ANW%G c!H gkz |CH f
l!8 L 8:dRi; 3! W gkR GQL V@OY. 9& in, 68 GB
8m- }:; 'X Y% @kANW%G %LM#L:N ;N ,aOB M: g
kG! wTGv J@OY. ANW%L 3!H Mz ?OQ bh!- L ANW%
z T2 gkOB fl!8 L 8:dRi; 3! W gkR GQL V@OY.
ANW%: IBM WebSphere Application ServerM IBM HTTP Web
Server(″IBM -v″)G )/ NP; wTUOY. ANW%G c!H gkz |C
Gv J: Y% IBM -v& 3! GB gkR GQL x@OY. IBM -vB A
VGgW 57
NW%L 3!H Mz ?OQ bh! sVX_ Og ANW%z P.O) IBM -
v& 3! GB gkR GQL x@OY.
Java W pg Java b] s% W NmB L9 W b8 9!! nOH Sun
Microsystems,Inc.G s%TOY.
Microsoft, Windows, Windows NTW Windows NmB L9 W b8 9!!
nOH Microsoft CorporationG s%TOY.
UNIXB X/Open Company Limited.& kX 6!{8N gkGL N)GB L
9 W b8 9!!-G nOs%TOY.
Pentium: L9 W b8 9!! nOH Intel CorporationG s%TOY.
L ANW%!B RSA Data Security, Inc.NNM &x^: 8H R
A.~n! wTGn V@OY. Copyright © 1994 RSA Data Security, Inc. All
rights reserved.
L ANW%!B Hewlett-Packard CompanyNNM &x^: STL(%X [C4 s
Lj/.)L wTGn V@OY. Copyright (c) 1994.
v gkZB IBM! qk; vROv Jm L RA.~nM H;-& n2 q{8
Ng gk, 9g, v$, hw GB GER v V@OY. \, 'G z[G $8&
pg 9g;! mCX_ Og, &xOB H;-! 'G z[G $8M L c!
$8& pN mCX_ UOY. Hewlett-Packard CompanyB L RA.~nG
SG q{zG {U:; 8uOv J8g, mC{ GB OC{ 8u xL ″vs
kN″ &xUOY.
L ANW%!B Silicon Graphics Computer Systems, Inc.8NNM &x ^:
STL(%X [C4 sLj/.) RA.~n! wTGn V@OY. Copyright (c)
1996–1999.
v gkZB IBM! qk; vROv Jm L RA.~nM H;-& n2 q{8
Ng gk, 9g, v$, hw GB GER v V@OY. \, 'G z[G $8&
pg 9g;! mCX_ Og, &xOB H;-! 'G z[G $8M L c!
58 Trust Authority: gkZ H;-
$8& pN mCX_ UOY. Silicon GraphicsB L RA.~nG SG q{
zG {U:; 8uOv J8g, mC{ GB OC{ 8u xL ″vskN″ &
xUOY.
b8 8g, &0 W -q:m: 8g m/G s% GB -q: s%TOY.
VGgW 59
60 Trust Authority: gkZ H;-
|C $8
Trust Authority &0 H;-B IBM SecureWay Trust AuthorityH;-
CD-ROM! PDF W HTML |D8N &xGn V@OY. ON #`0G HTML
v|: &0z T2 3!Gg gkZ NMdL:& kX W<:R v V@OY.
#`0L &[H LD &0L /fGz; v5 V=; VvOJC@. VYG &0
$8 W gkZ! 1CQ pn W |D8N H #`0! W<:OB }! kQ Z
<Q ;k: ReadmeDO; |mOJC@. VE v|G ReadmeDO: Y= V
R! VB IBM SecureWay Trust Authority% gL.G Library dLv!- T
vR v V@OY.
http://www.ibm.com/software/security/trust/library
Trust Authority sLj/.!B Y=G H;-! wTGn V@OY.
3! W G`
L %!-B &0G 3d& &xUOY. &0 d8gW; *-Om 3! }
w& 3mOg " &0 8:dR! gk !IQ BsN 5r;! W<:
OB f}! kQ $8& &xUOY. L %: &0z T2 NbGn h
wKOY.
C:[ |. H;-
L %!B Trust Authority C:[ |.! kQ O]{N $8! wTG
n V@OY. -vG C[ W _v, O# /f, -v 8:dR |., (g
v` W %LM +a: !K G`; 'Q }w! wTGn V@OY.
8: H;-
L %!B 3$ 6}g& gkO) Trust Authority C:[; 8:OB f
}! kQ $8! wTGn V@OY. 6}g& 'Q BsN 5r;; 8
B ?H L H;-G HTML v|! W<:R v V@OY.
nO b| %:)> H;-
L %!B RA %:)>; gkO) Nu sLA gL, |<! ID N
© Copyright IBM Corp. 1999b 61
u; |.OB f}! kQ $8! wTGn V@OY. %:)>G BsN
5r;; 8B ?H L H;-G HTML v|! W<:R v V@OY.
gkZ H;-
L %!B Nu 9f W |. f}! kQ $8! wTGn V@OY. Trust
Authority jslz nO gD; gkO) Nu; d;, ;E W kRO
b 'Q }w! &xGn V@OY. GQ PKIX Xv Nu; 'X g| n
OOB f}z Trust Authority ,sLp.& gkO) L Nu; |.O
B f}! kX p^Om V@OY. ,sLp.G BsN 5r;; 8B
?H L H;-G HTML v|! W<:R v V@OY.
Trust Authority % gL.G Library dLv!B Trust AuthorityG 3!, |.
W gk! 5rL GB b8 .-! wTGn V@OY. 9& in, nO AN<
:& gkZ $GOB f}! kQ _! v'; < v V@OY.
62 Trust Authority: gkZ H;-
kn}
L kn}: ;.! *@B uNn kn* #
wOv J: knM W `n& $GOm gk
Z! |I Vn R kn& $GOm V@OY.
kn W W $GB Y= Za!- _iQ MT
OY.
v IBM Dictionary of Computing, New York:
McGraw-Hill, 1994.
v American National Standard Dictionary for
Information Systems, ANSI X3.172–1990,
American National Standards Institute
(ANSI), 1990.
v The Answers to Frequently Asked
Questions, Version 3.0, California: RSA
Data Security, Inc., 1998.
!
!s 3Nk W.v)(VPN). |-1L FQ NM]; g
kO) x] ,a; 8`OB 3Nk %LM W.v). g
kZiL |- 8g! FQ NM] -q: &xZ(ISP)&
kX |g{ W.v) Zx! W<:Ob '.! 6w<
!- x] W<: qk; sg NP }`R v V@OY.
VPN: GQ %LM 3/G 8H:; bsC5OY. b8
G f-. bzG fl ^Cv ;k: O#-C3 v V
8* R: W VRB O#-C3 v x@OY. VPN b
z!-B gkZ! |< $8 P6(;k W lu); O#
-Om 86-Q MN ,a; .3R v V@OY.
(g NW. Trust Authority!- (g L%.6Y O*
?G 9Ze& zeOB %LM#L:G WLm.
(g -v. (g ,sLp.NNM (g L%.& vE
Om L& (g NW! bOOB Trust Authority -v.
(g -jC:[. Trust Authority!- 8H |C 6!
! kQ Nk; vxOB -jC:[. ]6 -q: jw
; 'Q xk 0 O# [:}!- _%Q %X <. _
X9.57 %XG GegW; XvUOY.
(g _{. m.{ fN |D8N H %LMN-, L%.
x-& ,aOB %LM. (g _{; kX .#hGL*
Xg 0?G bO; _{R v V@OY.
(g ,sLp.. Trust Authority (g -vN (g L
%.& |[OB C:[G SG ,sLp.. (g ,sL
p.B (g -vN L%.& |[Ob |! (g -vM
G ,a; 3$UOY. ,aL 3$H D ,sLp.B (
g -jC:[ ,sLp. sLj/.& gkO) L%.
& (g -v! |^UOY.
3f| %LM#L: ,a:(ODBC). -N Y% %LM
#L: C:[; W<:Ob 'Q %X.
3f| C:[ s#,a(OSI). ISO!- NuQ D;M
W.v7 %X L'.
3Nk 0. R/Z8 gkR v VB xk/3Nk 0 V
G 0. L 0& kX R/Z! 3Nk .#hG; vEO
E* pvP Nu; v`R v V@OY. 3Nk 0N -
mH %LMB Xg xk 0N8 .NL !IUOY. x
k 0M q3OJC@. GQ xk/3Nk 0 V; |mO
JC@.
TL.~L. q#/ W.v) GB @kANW%L -N
kER v V5O OB bI{ \'.
© Copyright IBM Corp. 1999b 63
f. p:d. W<: ANd](LDAP). p:d. W<
:! gkGB ANd].
xk 0. Y% gkZ! gkR v V5O X VB x
k/3Nk 0 VG 0. .#hG; 0 R/Z!T v$O
E* pvP Nu; .NR v V5O UOY. xk 0N
O#-H %LMB Xg 3Nk 0N8 X6L !IUO
Y. 3Nk 0M q3OJC@. GQ xk/3Nk 0 V;
|mOJC@.
xk 0 O# [:} %X(PKCS). YgQ D;M w<
G k%Ziz T2 RSA ,8R!- 1991b! 3_Q q
x D { N w < # % X . L % X : RSA O # - ,
Diffie-Hellman y`, O# b] O#-, .eH Nu 8
., O#- ^Cv 8., 3Nk 0 $8 8. W.m N
u 8.; 8fUOY.
v PKCS #1: RSA xk 0 O#- C:[; gkT8
Na %LM& O#-OB f}; 3mUOY. pvP
-m W pvP @u! gkOB ML W q{TOY.
v PKCS #7: O#- ^CvG O] |D; v$UOY.
v PKCS #10: Nu d;G %X 8.; v$UOY.
v PKCS #11: :6. +e nG O#- e!& 'Q b
z 63{ ANW!V NMdL:& $GUOY.
v PKCS #12B gkZG 3Nk 0, Nu, b8 qP $
8 n; zeOE* |[Ob 'Q L? !IQ |D
; v$UOY.
xk 0 ON86(PKI). xk 0 O# [:}; b]8
N OB 8H RA.~nG %X. PKIB pvP Nu, N
u b|, nO GQ, Nu |. -q: W Pj p:d.
-q: C:[TOY. LM: NM] sG .#hG! |
CH " skfG Ex W GQ; .NOB % gkKO
Y. L .#hG!B Ex .NL JdQ 6[L ,|I
v V@OY. 9& in &H- T{Z, |Z lm ^C
v [:Z GB ]6 E!& .NOB fl! V@OY.
PKIB xk O#- 0M /?Q 3NL* 6w<!- N
uOB gkZ Nu; [:O) WM 0: 3.& v`U
OY. pvP Nu, Z] um, pvP -m; .NOb '
X gkGB xk O#- 0M NuL wTH BsN p
:d.& &xUOY.
PKIB xk O#- 0& 'Q .N 68 W d;! k
X ESOm ?2{N @d v\; &xUOY. GQ C
:[! kQ ag{N 8H 'h dR& D0Om 8H '
]; 3.Ob 'Q Zx; /v8vUOY. 6v78N
PKIB _dQ qvO: E!! pvP C# RN -q:
& &xUOY.
xk/3Nk 0 V. xk/3Nk 0 V: 0 V O# [
:}G 3d _ ONTOY(0 |. .&!; XaOb '
X DiffieM Hellman! GX 1976b! R3J). W 3d
! {#i " 3NL 0 V; R/Og O*& xk 0,
Y% O*& 3Nk 0N N(OY. 3Nk 0! qPN
/vGB ]i! " 3NG xk 0B x%KOY. [E
ZM vEZ! qP $8& x/R Jd! x@OY. p
g kE!B xk 08 |CGm 3Nk 0B |[GE*
x/GB OL x@OY. 5;L* xN! kqO) ON
kE $NG 8H; 'X u Ls ON kE $N; E
ZR v V5O 8i Jd! x@OY. /OQ d8gW
: xk 0& EZ(Nu) fD8N(9: EZ p:d.N)
gkZM ,|CQ_ QYB MTOY. xk $8& gk
Oi )8gv qP ^Cv& [ER v V@OY. W/
* 3Nk 0N8 ^Cv& O#-R v V8g W ^C
vB h9H vEZG \6 R/TOY. GQ 0 V O#
[:}: 3Nk8N(O#-) S8 FOs Nu(pvP -
m)!5 gkL !IUOY.
xk TL.~L NMdL:(CGI). % dLvM % -
v #G %X $8 |[ f}.
xk %LM 8H F0X3(CDSA). D;M b] 8H
@kANW%G 8H -q: W 8H |.! kQ w}{
"Y}; $GOb 'X 3_H M. D;M C'{L @k
ANW%; 8Y H|OT 8#R v V5O IntelL 3
_Q MTOY.
64 Trust Authority: gkZ H;-
xk O#- F0X3(CCA). Vd IBM D;C C'{
!- O# [:}! kQ O|H "Y; !IOT XVB
IBM RA.~n. YgQ ANW!V pnN [:H @k
ANW% RA.~n& vxUOY. @kANW% RA.
~nB DES W RSA O#-& wTO) $|'Q O#
- bI; v`OB CCA -q:& #bR v V@OY.
8P L'(DN). p:d.! zeH %LM WqG m/
L'. DN: p:d. h~ 86!- Q WqG '!& %
CUOY.
8P NZy T"(DER). BER! kQ &`; &xUO
Y. DERB NZy T"L ckOB NZy /| _ \
O*G NZy /|8 1CT8Na [EZG IG pN
& &EUOY.
93 8H b|(NSA). L$NG xD{N 8H \<.
9& kE \<(ITU). $N W 3N \'! |<hG k
E W.v) W -q:& kUOB 9& 6w. kE bz,
T& W %X $8G 15{N x3ZTOY.
9& %X b8(ISO). MN \!- D;M W.v) A
Nd]! L#bnv pg M! kQ %X; 3_ W .
3Ob 'X 8:H 9&{N 6w.
GQN). Zx W<:! kQ c!.
UO Zx '! 3$Z(URL). NM] sG Zx VR
v$; 'Q 3h. URL: ANd], #:. L' GB IP
VR& mCUOY. /$ bhNNM Zx! W<:Ob '
X JdQ w. x#, fN, Zx <NgW5 mCUOY.
bP:. GQL xB skf!TB )3Gv JB /:.
b; NZy T"(BER). ASN.1(_s 8. %b} 1)!
- bzQ %LM NZy \'! kX ISO 8825!- v
$Q T". L T": _s 8.L FQ NZy bz; v
$UOY.
*
;N 86. :06& |mOJC@.
Y
\x lm |[ ANd](SMTP). NM] s!- |Z
lm; |[OB ANd].
ks. v$ GB 1CH %LM R:.
k*{ O# [:}. O#- W X6! 0: 0& gk
OB O# [:}. L 0! 8H:G |GL KOY. 0
! kbGi )8gv ^Cv& X6R v VT KOY.
0! qPN /vGB ?H!8 kEG qPL /vKO
Y. qk*{ O# [:}z q3OJC@.
k*{ 0. O#- W X6! pN gkR v VB 0.
k*{ O# [:}; |mOJC@.
%LM O#- %X(DES). xD %X8N- 1977b L
$N!- $G W BNQ O#- mO O#(cypher). x
!B IBML 3_Q M8N-, x3H LD xP: ,8
z$; ED vgB _ KAvm $|OT gkGm VB
O#- C:[TOY.
DESB k*{ O#- C:[TOY. {s- kE! gk
I fl [EZM vEZ! pN 0: qP 0& ]eC
Km Vn_ UOY. L 0B ^Cv O#- W X6! g
kKOY. GQ O# |D8N Oe p:)! DO; z
eOB nG \O gkZ O#-!5 gkR v V@O
Y. DESB 64q. mO )b& !vg O#- _!B 56
q. 0& gkUOY. x!B Oe~n!- 8vO5O 3
hH MTOY. NISTB xD{N L$N O# %X8N
- 5b6Y gNuL Lgn}OY.
%LM ze5* sLj/.(DL). Nu, CRL, 0, $%
W b8 8H |C @j'.G 58 %LM zeR! W
<:R v V5O OB pb.
kn} 65
5^N. 8H 5^N W nO 5^N; |mOJC@.
nO. Trust Authority!-, NM] s!- gkR Z]
um-& 9fOB AN<:. nO!B NuG d;, ;E
W kR! wTKOY.
nO b|(RA). nO d;L 3= vEH 'NNM N
uL kRI 'nv 6wG qnO: $%L ]5I v V
5O Ob 'X pvP Nu; |.OB RA.~n.
nO %LM#L:. Nu d; W _`H Nu! kQ $
8& !vm VB M. %LM#L:B nO %LM& z
eOm |< sLA gL,! I# Nu %LMG /fg
W pN& zeUOY. %LM#L:B RA AN<:M b
8 $%; kX, GB RA %:)>; gkOB |.Z!
GX w%L.I v V@OY.
nO 5^N. Zx, $%, W.m /$ Nu nO AN<
:M |CH 8: IGG }U. 5^N L': nO @k
ANW%; G`OB % gkGB URLG O' }UTO
Y.
nO /v. nO S:; |mOJC@.
nO S:. nO gD! wTH nO /v. L *: n
O _! r: $8& ]5UOY. nO S:G *: Z]
um-! /?Q |< C# ?H ?OOT /vKOY.
nO @kANW%. #<< nO(9: jslz, slM, |
Z lm, 8H ,sLp. @kANW% n) W |< s
LA gL, ?HG Nu |.& 'X /v-H v\; &
xOB Trust Authority @kANW% A9Sv).
nO AN<:. Trust Authority!-, gkZM gkZG
xk 0& NuO) .#hG! |)C3 v V5O gk
Z& /?-OB \h. L AN<:B NCL* %; b
]8N R v V8g, gkZ# s#[k; kX Z?-
Om |.R v V@OY.
p:d.. kE(|Z lm GB O#- 3/ n)z |C
H $8& 'Q $* zeRN gkOb 'X mHH h
~{ 86. p:d.B PKI 86! Jv dRN /$ W
q(xk 0, Nu W Nu kR qO n); zeUOY.
p:d. ;G %LMB .. |D8N h~{8N 8:
Gg ..G G 'B g.! XgKOY. 'NB s' 9
' 6w<! 30 9!, $N GB 8g& *8@OY. g
kZ* e!B 8k " ..G .AN %CKOY. .A
! XgOB gkZ, 6w, v*, 9! W e! ""!B
Z<G WqL wTGn V@OY. " Wq: /|-H S
:8N Lgnvg, L S:i: Xg WqL *8;B @
j'.! kQ $8& &xUOY.
p:d.G " Wq: ,|H DN(8P L')z ,aGn
V@OY. LM: G&{8N 8gOB @j'.! m/Q
M8N KAx S:L wTGn VB fl! m/X}O
Y. Y=G 9& DN; ll 8i, 9!(C)B L9, 6w
(O): IBM, 6w \'(OU)B Trust, 8k L'(CN):
CA1N M; < v V@OY.
C=US/O=IBM/OU=Trust/CN=CA1
p:d. -v. Trust Authority! wTH IBM
SecureWayp:d.. L p:d.B LDAP %X; v
xOg DB2& W b]8N gkUOY.
pU. iWsne!- 8:)& 3.OB ANW%. 5r
;L JdQ 6GL _}R fl +6G #bKOY. k
3B C:[L Z?8N G`C0GN gkZ! pU; N
DR JdB x@OY. pU: 58{8N 8gR v5 V
m C:[L O$ #]; Nm g}:R v5 V@OY.
L kn(pU8N _=)B E-!- *B MTOY. vg
B DAEMON(Disk And Execution MONitor)G `n
N X.Gm V@OY.
pvP -m. [EZG Ex; 8uOB .- GB %L
M! _!H Ze- ^Cv.
pvP -m: G& -m8Y u P: 8H 9'; &x
UOY. W L/B pvP -mL O#-H L' GB \
xQ D0 Ze C.n! FOs, -mGB ^CvG O
#-H d`Lb '.TOY. W/GN ^Cv! pvP -
66 Trust Authority: gkZ H;-
m; T8Na [EZG .GQ Ex; &xUOY. ([E
ZG 08 -m; [:R v V@OY.) GQ -mGB ^
CvG ;k; m$R v5 V@OY(O#-H ^Cv d
`: ^Cv ;kz ]eC O!X_ Og O!Ov J;
fl!B -mL +?-KOY). W/GN pvP -m;
Q ^Cv!- 9gO) Y% ^Cv! {kR vB x8
g LB d` GB XC! O!Ov Jb '.TOY. -
mH ^Cv! kQ /fL On/ fl!B Xg -m G
Q +?-KOY.
pvP -m Km.r(DSA). pvP -m %XG ON
N gkGB xk 0 Km.r. O#-!B L Km.r
; gkR v x8g pvP -m!8 gkR v V@O
Y.
pvP Nu. Nu; |mOJC@.
pvP Nu-. EZR v VB & 3Z! 3NL* #<
<! kX _`Q |Z Z] um-. " Nu-B CA 3
Nk 0& gkO) -mL Lgn}OY. 3N, qvO:,
6w<G Ex; 8uUOY.
CA *R! {s-B NuL NM]s!- |Z qvO:
& v`Ob 'Q RvZG GQ; umUOY. n2 G
L!-B pvP Nu-! n| icuL* Gk 9w u
m-M 0: *R; UOY. {s- L pvP Nu-B
Xg 3Nk 0G RvZ! /$ e-business0?; v`
R v VB GQL V=; umUOY.
Nu-!B NuQ #<<! 3NNv bhNv GB D
;M ANW%Nv! |Q $8! in V@OY. o, X
g #<<! NuH xk 0! V@OY.
6
^Cv d`. SG )bG ^Cv& gkOm m$ fL
G g; bBOB kR! R!IQ bI. MD5B ^Cv
d` Km.rG Q 9TOY.
^Cv Nu Ze(MAC). [EZM vEZ gL! x/
GB qP 0. [EZB L& NuOm vEZB KuU
OY. Trust Authority!- MAC 0B CA W (g 8
:dR& 'Q KeyStores! zeKOY.
pb/:. RSA xk 0 O#- C:[!- N 3G +
Rv(pM q)& vX- }:H v(n). RSA pb/:G V
{ )bB 8H d8! {s ^s}OY. pb/:! ,
vO u 9: 8HL Lgn}OY. RSA ,8R!- G
eOB 0 )bB 0G gk! {s Y(OY. o, 3N
kLi 768q., bwkLi 1024q., CAG 0 Vz 0
: FV _dQ 0! kX-B 2048q.TOY. 768q.
0B VRQ 2004bnvB 8HGB M8N 9sKOY.
+a:. C:[!- GQL xB v$; ]vR fl C
:[L %LMG +a:; 8#UOY(GQL xB )3;
]vOB %LMG bP:; 8#OB MzB ]kN).
+a: !K. \N 8:dRMG .#hG; kX }:H
(g 9Ze& !KOB M.
.- O#- 0(DEK). O]{8N, DES nG k*{
O#-/X6 0.
Y
YL.Ze. JavaDDO/! }:Om JavaNMA.M
! G`OB bh 63 Ze.
_`H Nu qO(ICL). _`H Nuz NuG vg s
B! kQ O|Q qO. Nu: OC x#M sB0N v
N-Gn V@OY. L qO: CA! |.Og CA %L
M#L:! zeGn V@OY.
f-.. W.v)#G $8 e'; &QOB W.v)#
TL.~L. 8k \NG GQL xB gk8NNM ;N
W.v)& 8HOb 'X gkKOY.
8H 5^N. ?OQ CA! GX NuH Nu-& R/
Q Wl(8g, [w WlL* @, 30 GB $N \<).
kn} 67
CA! -mQ Nu-& R/Q gkZi: 0: CA! -
mQ Nu-& .m VB Y% gkZG Ex; EZR v
V@OY.
8H RO h~(SSL). V> gkZ!T VkQG um
:; &xOB ;e 8H -q:& !x IETF %X k
E ANd]. pvPN 8HGB kE $N; &xUOY.
SSL gk !I -vB Ws %X HTTP d;L FQ Y
% w.!- SSL ,a d;; BNUOY. SSL: N p
) #G kE; 3$Ob 'Q E# 3/L \ Q x _
}X_ R ' <G; [:UOY. W Y=!B kEL O
#-KOY. ^Cv +a: !K: SSL <GL 8bGb
nv G`KOY.
8H |Z .#hG(SET). EZR v xB W.v) s
!- 8HH Ek+e* v] +e vR; KxOB jw
%X. L %X: NuG _`; d;Ob '.! +e R
vZ, sN, +e _^ :`G Nu; kUC5OY.
NN. 9& in gkZ! [EQ /$ ^Cv* &bQ
/$ d;; NNOB Mz 0L |L FQ M8N EN
OB M.
NN @b. .-G -mZ! .-! -mQ M; W8v
J: M8N ENOv J5O pvP 3Nk 0& gkO
B M.
jslz. % jslz& |mOJC@.
jslz Nu. pvP Nu: ,sLp.x NuLsm
5 UOY. L Nu: SSL gk !IQ % -v& kX
CA! _`UOY. O#-H DOG 0& kX Nu 8/
ZB %LM& O#-Om X6Om -mR v V@OY.
O]{8NB % jslz! L 0i; zeUOY. ON
@kANW%!-B :6. +e* Y% E<! 0& z
eO5O ckOm V@OY. pvP Nu; |mOJC@.
qk*{ O# [:}. O#- W X6; 'X -N Y
% qk*{ 0& gkOB O# [:}. " gkZB Q
VG 0& ^T Gg, L _!- xk 0B pg gkZ
! W<:R v V8g 3Nk 0B gkZ ZE!T8
KA}OY. 8H .#hG: xk 0M L! k@OB 3
Nk 0! O!O) .#hGG X6L !IQ fl!8
Lgn}OY. LM; 0 V O# [:}Lsm5 UOY.
k*{ O# [:}z q3OJC@.
q?b kE. [EZM vEZ! ?C! 8gOv JF
5 GB kE pe.
qP:. GQL xB %LM )3NNMG 8#.
qP: 8# -- ^O(PEM). NM] qP: 8# -
- ^O %X8N-, NM] s!- H|Q |Z lm;
&xOb 'X IAB(Internet Architect Board)! $CQ
%X. PEM ANd]: O#-, Nu, ^Cv +a:, 0
|.& &xUOY.
qnO: AN<: @j'.. /$ nO [w; v`O
B % gkGB Ze <.(9: nO d; sB !K GB
xk 0 vE )N Ku).
qnO: AN<: [C... v$H x-N G`GB q
nO: AN<: @j'.G p=.
g
gkZ Nu. ^CvG x! [:Z& D0Om ^Cv
R/Z& $g-OB /?: Ku AN<:. GQ bkQ
V> gkZ* C:[z kE _Nv5 .NUOY.
gL. Nu. CA Nuz /gOv8 /$ % gL.!
kX-8 /?Q Nu. CA Nu; |mOJC@.
g|nO. Trust Authority!- Q gkZ(k3B |.
Z)! Y% gkZ& nOR v V5O OB AN<:. d
;L BNGi RAB Xg gkZ! LD Trust Authority
,sLp. @kANW%; gkO) Nu; 9fR v V
5O OB $8& &xUOY.
68 Trust Authority: gkZ H;-
s# Nu. 3Nk -m 0M ,|H xk 0! in V
B Nu; Q CA! Y% CA!T _`OB EZ p(.
O]{8N s# 8uH Nu; gkOi O*G |. c
g 5^N! wTH ,sLp. C:[L* #e #<<
! Y% 5^N! wTH ,sLp. C:[L* #e #
<<M H|OT kER v V@OY.
-m. -m; }:Ob 'X 3Nk 0! gkOB M.
-m _N ^Cv& gkZ! %Svm BNT; TuO
B v\8N- gkKOY.
-m/Ku. -mQYB M: -m; }:Ob 'X 3N
k pvP 0& gkOB MTOY. KuQYB M: -
m; KuOb 'X k@OB xk 0& gkOB MTO
Y.
-v. (1) W.v)!- DO -v nG Y% :WLG
8N bI; &xOB %LM :WLG. (2) TCP/IP!-
,sLp./-vN N#B Y% gL.! VB C:[G
d;; 3.OB W.v) ;G C:[.
-v Nu. % -v! SSLk .#hG; 3.R v V
5O CA! _`Q pvP Nu. SSL ANd]; gkO
) jslz! -v! ,aGi -v! jslzN W x
k 0& [EUOY. L/Q z$; kX -vG Ex;
NuR v V@OY. O#-H $8& -v! 8> v5
V@OY. CA Nu, pvP Nu W jslz Nu; |
mOJC@.
-m4. Javagk !I -v! _! bI; &xOB -
vx ANW%.
:6. +e. gkZG pvP 0& zeOb 'X gk
GB 8k Ek+e )bG Oe~nG O>. :6. +
e!B O# 8HL !IUOY.
:06. p:d.M |CH M8N-, -N Y% @j'
. /|#G |h& $GOB ;N 86.
EZ 5^N. ?OQ CA! GX NuH Nu-& R/
OB #<<iG }U.
EZ p(. Nu GQL Y% Nu GQ; umOB f
}; &nOB 86{N T".
EZ D;M b](TCB). 6wG D;M 8H $%; }
U{8N G`OB RA.~n W Oe~n dR. 8H $
% Gv! 5b; L!B dR GB dR NP: 8Hz
|CH M8N- TCBG ONTOY. TCBB 8H fh
N &QGB @j'.TOY. 8H $%; G`OB ^?
Or: s4 xLO|X_ Og, GQL xB C:[ /
G! kQ W<: GQ; rv xO5O X_ UOY.
F
O# [:}. D;M 8H! Vn- O] X:.G O#
- W O#- X:.G X6; 'Q x", GL, f} n.
O# X6(decrypt). O#- AN<:& G`kROB M.
O#-. (1) {gQ X6 Ze& !x gw8L X6;
kX x! $8& r; v V5O $8& Z/B M. (2)
W GL& {bb 'Q %LM //z |CH M.
O#-/X6. 9$H vEZG xk 0& gkO) W g
w; 'X %LM& O#-Q D %LM X6! xk 0
M V; LgB 3Nk 0& gkOB M.
VC4. JavapnN bOGm Java#/ % jslz!
- G`GB D;M ANW%. JavaVC4Lsm5 UO
Y.
W<: &n qO(ACL). /$ ZxG gk; GQL V
B gkZ!TN &QOb 'Q ^?Or.
":.s]. /gQ bz; gkOB NM]G D}0. 9
: 8giL m4, D.J, ;N :G n )/ }\! k
X % x3, |ZsE!, ^Cv |[, Wl~n& {kO
m V@OY.
kn} 69
#e #<<. CA! FQ NuG V<.
@j'.. 4< vb 3h* ANW!V! Vn- _s
86- %LM W W %LMM ,|H 6[. ,!:& |
mOJC@.
@j'. D0Z(OID). ASN.1(_s 8. %b} 1)!
- $GQ /|8N- |. q{8N v$H %LM *.
@j'. /|. p:d.! zeC3 v VB @j'.
>y. 9& in N-, 8GG, e!, 3N, ANW% GB
AN<: n.
d; ID. RA! kQ Nu d;; m/OT D0OB
24-323G .ZN H ASCII *. L *: Nu d; .
#hG! gkGn d;G sB GB WM |CH Nu;
KvR v V@OY.
ye MLe %(WWW). OL[Lpn %LM& !x D
;M#! W.v) ,aL .3H NM] NP. L %L
MiL $8& &xOg WWW W NM]G Y% %L
M! kQ 5)& &xR v V@OY. WWW Zx: %
jslz ANW%; kX W<:KOY.
% jslz. %:)> PC!- G`Gn gkZ! ye
MLe % GB NC HTML dLv& #F< v V5O
XVB ,sLp. RA.~n. %z NM]!- gkL
!IQ + OL[Lpn %LM }U! kQ xkG W<
:& &xOB Kv 58TOY. n2 jslzB X:.
M W!H; pN %CR v VB ]i, n2 jslzB
X:.8 %CR v V@OY. kNPG jslz! FTP
.#hGz 0: Vd NM] kE |D; 3.UOY.
% -v. jslz ANW%8NNMG $8 Zx d;
! @dOB -v ANW%. -v& |mOJC@.
/OZe. ISO 10646!- $GQ 16q. .Z <.. /
OZe .Z NZy %X: $8 3.! gkGB 9& .
Z ZeTOY. /OZe %X: |<hG _dQ :)3
.& wTOg, RA.~nG 9&- W v*-& 'Q b
J& &xUOY. Java ANW!V /fG pg R: Z
eB /OZeN bOKOY.
/|. @j'. /|; |mOJC@.
N:O:. DB2! Vn- N:O:B %LM& zeOm
@kANW%; v`Ob 'Q m.{ %LM#L: |.
/fTOY. 8: E3/vG xk <.& )/ %LM#
L:! kX $GR v V5O ckUOY.
Nu. (1) 3N, qnO:, 6w<G Ex; 8uUOY.
(2) kE _N skfG Ex; G0OB AN<:.
Nu b|(CA). 6wG 8H $%; XvOm Nu |
DG 8H |Z EP; v$R %SL VB RA.~n.
CAB RANNMG Nu _`, ;E W kR d;; 3
.UOY. CAB RAM s#[kO) Nu W CRL; p
:d.! x%UOY. pvP Nu; |mOJC@.
Nu $%. xk 8H d8gW; !vB /$ ,!:G
@kANW%! kQ NuG {k !I:; v$OB T
"; mCQ }U. 9& in Nu $%: /$ Nu /
|; kX gkZ! Vnx !] |' H!- s0! k
Q .#hG; v`O5O ckR MNv )N& v$R
v V@OY.
Nu kR qO(CRL). Nu b|L kRQ NuG qO
8N- pvP -m W C# RNL {kH qO. L q
OG Nui: ck R!N #VKOY. pvP Nu; |
mOJC@.
Nu ANDO. xOB Nu /|; $GOB /!iG
}U(9: SSL Nu GB IPSec Nu). L ANDO: N
u gg W nO; |.OB % 5rL KOY. _`ZB
ANDOG L'; /fOm xOB NuG /!(9: /?
b#, 0 k5, DN &` n); v$R v V@OY.
Nu .e. Nu! _! Je& wTC3 v V5O O
B X.509v3 Nu |DG 1C{ bI. %X .e W g
kZ $G .eL V@OY. %X .e: 0 W $% $
70 Trust Authority: gkZ H;-
8& wTQ YgQ q{, V< W _`Z S:, Nu f
N &` n; 'Q MTOY.
NM]. D;M#! |Z{ ,a; &xOB |<h{N
W.v) }U. NM]: D;MiL |Z lm GB %
jslz nG RA.~n e!& kX -N kER v V
5O X ]OY. O*G W.v)! VB nn kPiL
NM]; 8:O) /gQ Y% W.v)M wJN ,a
OB ML W Q 9TOY.
N.s]. 8k f-. Z! sVOB bw ;G W.v
). NM]G D}0N- WM /gQ bz; gkUOY.
bz{8N N.s]: NM]; `# .eQ M! Rz
UOY. HTML W HTTPB L _!- 8m-H MTO
Y.
O] X:.(plaintext). O#-Gv J: %LM.
cleartextG ?Gn.
Z
Z] um-. Nu 3/C 3NG Ex; .NOb 'X
gkGB bP $8. W.v) D;C /f! Vn- Z
] um-G !e O]{N /|: CA! [: W -m
Q NuTOY.
Z9n vx(NLS). pn, k-, /% W C# |D, }
Z %b& wTO) v*0 /:! {% wL!; &0 ;
!- vxOB M.
|[ &n ANd]/NM] ANd](TCP/IP). LAN W
WAN; 'X kn(peer-to-peer),a: bI; vxOB
kE ANd] <..
$% "C.. nO @kANW%!-, @kANW%L #
bOB 6w $G ANW%. $% "C.! v$H T"
: 6wG qnO: W 8H 1#gW; nO AN<:!
{kUOY.
6! w:d.. Z] um-G sLA gL,!- `{H
L%.G p=.
w
<N /?: .N. Nu; _`Q EZ h~ ;G pg
CA BNG /?: .N. 9& in Q CA! Y% CA
& kX -m Nu; _`Q fl, N -m: pN gk
Z! &COB NuG /?: Ku z$; kX /?-K
OY.
Vm CA. PKI CA h~G G '! VB CA.
_s 8. %b} 1(ASN.1). $8 %LMG 8.; $
GOB % gkGB ITU %b}. )/ !v #\Q %L
M /|; $GOm WM 0: /|G D0 W * v$;
'Q %b}; v$Q MTOY. L %b}: |[C $
8 O#- fDG &Q xL $8G _s{ 8.; $G
X_ R '6Y {kC3 v V@OY.
+
Ze -m. G` ANW%; pvP -m8N -mOb '
Q bz. Ze -m: NM]; kX PjH RA.~n
G EZ5& tLb 'X 3hH MTOY.
,sLp.. (1) -vNNM x/ -q:& vEOB b
I{ \'. (2) Y% D;M* ANW%G -q:& d;
OB D;M* ANW%.
,sLp./-v. Q gL.G ANW%!- Y% gL.
G ANW%8N d;; [EOm @d; bY.B Pj
3.G Q p(. d;OB ANW%; ,sLp., @dO
B ANW%; -vN N(OY.
,!:. 4< vb 3h GB ANW!V!- xk $G
& x/O) xk /:, 6[, [w /:; x/OB @
j'. Wl.
kn} 71
0. $8G O#- W X6; 'X O# [:}! gk
GB g.
0 V. qk*{ O# [:}! gkGB k@ 0. Q 0
B O#-! gkGm Y% 0B X6! gkKOY.
8
MN. VPN bz! Vn- NM]; kX LgnvB d
8 C! !s v!# ,a. ,aH ?H!B x] gkZ
! MN; gkO) bw<G 3Nk W.v)G -vM
8H W O#-H 86- $8& 3/R v V@OY.
.#hG ID. g|nO nO d;! kQ @d8N RA
! &xOB D0Z. Trust Authority ,sLp. @kA
NW%; G`OB gkZ! g| BNH Nu; 9fR
v V5O UOY.
D
DO |[ ANd](FTP). D;M#G DO |[; '
X gkOB NM] ,sLp./-v ANd].
%X |k 6)w pn(SGML). 6)w pn& bzO
B %X. HTML: SGML; b]8N UOY.
ANd]. D;M# kE; 'X y$H T`.
AOC -v. W<:& d;OB D;M(D;M A)M W
<:GB D;M(D;M B) gLG _3Z. W/GN V>
gkZ! A D;MNNM Zx; d;Oi L d;L A
OC -vN v$KOY. AOC -v!-B d;; [:
O) B D;MNNM @d; ^: Y= W @d; V>
gkZ!T L[UOY. AOC -vB f-. ;NNNM
ye MLe % Zx! W<:R ' /kUOY.
O
OL[X:.. gkZ! .-G %C W Kv; 'X 6
l:N )& v VB \n, 8, W!HL wTH X:..
LM 0: \n, 8 GB W!H; OL[5)sm Og
OL[5)& KvOB M; 5)QYm UOY.
OL[X:. 6)w pn(HTML). % dLvG Zy;
'Q 6)w pn. LM: SGML! bJOm V@OY.
OL[X:. .#hG ANd](HTTP). % s!- O
L[X:. DO; |[Ob 'Q NM] ,sLp./-v
ANd].
}Z
3_ DES. O] X:.& < x O#-C0B k*{ K
m.r. L& 'Q 9: f}iL VbB Ov8, !e H
|Q Y_ O#- |D: < 3G -N Y% 0& gk
OB 3_ DESTOY.
4758 PCI O#- ZAN<-. m:IG DES W RSA
O#- 3.& &xOB ANW!VL !IQ /6 ]@
bIG O#- PCI v: +e. O#- AN<:B +e
s! ;eH 8H e!!- v`KOY. +eB FIPS
PUB 140-1 9' 4 %XG v]Q d8gW; XvUO
Y. RA.~nB ;eH 8H e!!- G`KOY. Ek
+e E!B SET %X; gkOB Q 9TOY.
64x NZy. MIME; gkQ 2x %LM& //Ob
'Q O]{N f}.
A
ACL. W<: &n qO.
ANSI. L9 %X ,8R.
ANSI(American National Standards Institute). N
!H 6w<!- [:Q ANC`n& .3Om L9; S
GG jw %X; /v8vOB \<. }jZ, RqZ, O
]{N LM }\8N Lgn}OY.
ASCII. $8 3/; 'Q L9 %X Ze.
72 Trust Authority: gkZ H;-
ASCII(American National Standard Code for
Information Interchange). %LM 3. C:[, %L
M kE C:[ W |C eq #G $8 3/! gkG
B %X Ze. ASCII <.B 7q. Ze- .Z(P.<
<)k q.& wTO) 8q.)N Lgnx Ze- .Z
<.& gkOg, .Z <.B &n .Z W W!H .Z
N Lgn}OY.
ASN.1. _s 8. %b} 1.
B
BER. b; NZy T".
C
CA. Nu b|.
CA h~. Trust Authority!-, O*G CA! G ' 8
6! '!Om Vm W 3G >S CA ~L W F!! '
!OB EZ 86. CA& kX nOH gkZ* -vB X
g CA! -mQ Nu; ^T Gg s' vXG Nu h
~; hBUOY.
CA -v. Trust Authority CA(Nu b|) 8:dR&
'Q -v.
CA Nu. gkZG d;C, gk _N % jslz! N
DOv xOB CA!- BNQ Nu. W Y=!B jsl
z! L Nu; gkO) Xg CA! _`Q Nu; 8
/OB -vMG kE; NuUOY.
CAST-64. 64q. mO )bM 6q. 0& gkOB m
O O#(cipher) Km.r. LM: Carlisle AdamsM
Stafford Tavares! GX 3hGz@OY.
CCA. IBM xk O#- F0X3.
CDSA. xk %LM 8H F0X3.
CGI. xk TL.~L NMdL:.
cleartext. O#-Gv J: %LM. O] X:.
(plaintext)G ?Gn.
CRL. Nu kR qO.
CRL _` #]. CA 8: DOG 3$*8N- CRL
; p:d.! x%OB Vb gLG #] C#.
D
DEK. .- O#- 0.
DER. 8P NZy T".
DES. %LM O#- %X.
Diffie-Hellman. _m!(DiffieM Hellman)G L'!-
/!Q L'8N, 8HGv JB E<! kX x/ 0&
.3OB f}.
DL. %LM ze5* sLj/..
DN. 8P L'.
DSA. pvP -m Km.r.
E
e-business. W.v) W D;M& kQ qnO: .#
hG. 00 W -q:G 8T W GE! wTKOY. G
Q pvP kE; kQ Z]G L?L wTKOY.
e-commerce. qnO: # .#hG. NM] s!-G 0
0 W -q:G 8T W GE(-q:, x^Z, GEwZ n
; kQ)! wTKOY. e-businessG b;{N dRTO
Y.
F
FTP. DO |[ ANd].
kn} 73
H
HTML. OL[X:. 6)w pn.
HTTP. OL[X:. .#hG ANd].
HTTP -v. jslz W W.v)G Y% ANW%z
T2 % b] kE; 3.OB -v.
I
ICL. _`H Nu qO.
IETF (Internet Engineering Task Force). NM]k
ANd]G h9 W 3_; _!{8N 3.OB Wl. W
.v) 3hZ, n5Z, }jw<, ,8xG 9&{N }
\; k%UOY. IETFB NM] F0X3G 3_ W N
M]G x0Q gk n; VN YlOY.
IniEditor. Trust Authority!- 8: DO; m}OB
% gkOB 58.
IPSec. IETF!- 3_Q NM] ANd] 8H %X.
IPSecB W.v) h~ ANd]N-, Nu, +a:, W<
: &n W bP:G aU; /?{8N vxOB O#-
8H -q:& &xOb 'X mHH MTOY. -Q N
u bI8N NX L %X: 9: VPN &0 GEwZi
L NM] s!- H|Q v!# ,a; 8`Ob 'Q A
Nd]N- $COm V@OY.
ISO. 9& %X b8.
ITU. 9& kE \<.
J
Java. Sun Microsystemsg!- 3_Q W.v)& N
DOB, C'{ xk D;M bz <.TOY. Java /f
: Java OS,YgQ C'{G !s bh, 4< vb Java
ANW!V pn, )/ ,!:G sLj/.N 8:KOY.
Java !s bh(JVM). YL.ZeG X.; cgOB
Java 18S /fG ON.
Java VC4. VC4; |mOJC@. Java @kANW
%z q3OJC@.
Java pn. VC4z !L|. @kANW%k8N /0
w 3hH Sun Microsystemsg!- 3_Q ANW!V
pn.
Java @kANW%. Java pnN bOH 63{ ANW
%. % jslzG \X:. \N!- G`KOY.
Java ,!:. Java ANW% Ze \'.
K
KeyStore. Trust Authority 8:dR Z] um-(9;
O#-H |DG 0 W Nu)& zeOb 'Q DL.
L
LDAP. f. p:d. W<: ANd].
M
MAC. ^Cv Nu Ze.
MD2. 128q.G ^Cv d` XC Tv(Ron Rivest!
mH). PEM ANd]!- MD5M T2 gkKOY.
MD4. 128q.G ^Cv d` XC Tv(Ron Rivest!
mH). LM: MD28Y n h* u |(OY.
MD5. \fb ^Cv d` XC Tv(Ron Rivest! m
H). MD4! bsH v|TOY. MD5B 512q. mO
G TB X:.& 163G 32q. -jmO8N */OY.
L Km.rG bB: 32q. mO <.N- \O 128q
. XC *; 8:O5O ,aC2 MTOY. GQ PEM
ANd]!- MD2M T2 gkKOY.
74 Trust Authority: gkZ H;-
MIME(Multipurpose Internet Mail Extensions). -
N Y% .Z <. pnN H X:.G s# 3/; c
kOB Z/ST gkR v VB :e <.. GQ NM]
lm %X; gkOB 9: vG -N Y% D;M C:
[ #!- V<Lpn |Z lm; ckUOY. 9& i
n |Z lm ^Cv! US-ASCII, 3NQ X:., LL
v, gne& wTC3 v V@OY.
N
NIST. zE NBS(93 %X g+R)N KAx 93 %
X W bz y8. D;M b] jw! Vn- 3f %X
z s#nk:; uxC0B \<TOY.
NLS. Z9n vx.
nonce. gkZ Nu; d;OB -v* @kANW%8
NNM [EGB .Z-. Nu; d;^: gkZ! 3N
k 0& gkO) nonce! -mUOY. gkZG xk 0
M -mH nonce! Nu; d;Q -v* @kANW%
! YC [EKOY. W.m *i -v! gkZG xk
0N -mH nonce& X6OA C5UOY. X6Q nonce
! [EH x! nonceM 08i gkZ! NuKOY.
NSA. 93 8H b|.
O
ODBC. 3f| %LM#L: ,a:.
OSI. 3f| C:[ s#,a.
P
PC +e. :6. +eM /gOg PCMCIA +esm
5 UOY. L +eB :6. +e8Y 6] )m, 8k
u 9: k.; !}OY.
PEM. qP: 8# -- ^O
PKCS. xk 0 O# [:} %X.
PKCS #1. xk 0 O# [:} %X; |mOJC@.
PKCS #10. xk 0 O# [:} %X; |mOJC@.
PKCS #11. xk 0 O# [:} %X; |mOJC@.
PKCS #12. xk 0 O# [:} %X; |mOJC@.
PKCS #7. xk 0 O# [:} %X; |mOJC@.
PKI. xk 0 ON86.
PKIX. X.509v3 b] PKI.
PKIX CMP. PKIX Nu |. ANd].
PKIX Nu |. ANd](CMP). PKIX Xv @kA
NW%zG ,a; !IOT OB ANd]. PKIX
CMP! TCP/IP& Ow |[ ^?Or8N gkOB Q,
RO '!B _s- h~L 8gUOY. LM: _! z
5 |[! kQ vx; !IOT UOY.
PKIX ;kZ. /$ nO 5^NL Trust Authority ,
sLp. @kANW%8NNMG d;; ;kOB% gk
OB xk HTTP -v.
R
RA. nO GQ.
RA |.Z. RA %:)>! W<:O) Nu W Nu
! kQ d;; |.R GQ; N)^: gkZ.
RA %:)>. Z] um- d;; 3.Om Z] um
-! /?Q |< b#! ID L& |.Ob 'Q W!
H NMdL:& RA! &xOB Java VC4.
RA -v. Trust Authority nO b| 8:dR& 'Q
-v.
kn} 75
RC2. RSA %LM 8H; 'X Ron Rivest! 3hQ
!/ 0 )b mO O#. RCB Ron’s CodeGB Rivest’s
Cipher& *8@OY. DES8Y |#m DESG pTD k
<N- 3hH MTOY. {gQ 0 )b& gkT8Na
DES8Y u H|OE* Rp 0 =v! kX-B z H
|OT 8i v V@OY. 64q.G mO )b& !vg
RA.~n! Vn- DES8Y ` 2-3 h u |(OY.
RC2B DESM 0: peN gkL !IUOY.
RA.~n _%Z y8(SPA)M L$N#G y`!-
RC2 /v sB& &xUOY. LM: ]b BN AN<
:& O]{N O# v$} ]b AN<: 8Y u #\
Om |#T 8in ]OY. W/* |% ]b BNL {
UO5O 8ib 'X-B &0!- RC2 0 )b& 40
q.N ]eC &QCQ_(ON 9\B V8*) UOY. O
#-H + #b WLm; L. hjOAm C5OB 'T
Z& 7b 'X-B _!{N .Z-; gkR v V@O
Y.
RSA. _mZG L'(Rivest, Shamir, Adelman); }
xk 0 O#- Km.r. O#- W pvP -m! gk
KOY.
S
SET. 8H |Z .#hG
SGML. %X |k 6)w pn.
SHA-1(8H XC Km.r). pvP Nu %Xz gk
Ob 'X NIST W NSA!- 3hQ Km.r. L %X
: 8H XC %XLm SHAB %X! gkGB Km.
rTOY. SHAB 160q. XC& }:UOY.
SMTP. \x lm |[ ANd].
SSL. 8H RO h~.
S/MIME. NM]; kX |[GB |Z lmG -m W
O#-& vxOB %X. MIME; |mOJC@.
T
TCP/IP. |[ &n ANd]/NM] ANd].
TP. EZ $%.
Trust Authority. pvP NuG _`, ;E W kR&
vxOB kU IBM SecureWay8H VgG. L Nu:
$|Q NM] @kANW%! gkI v V8g, gkZ
& NuOm EZVB kE; 8eOb 'Q v\; &x
UOY.
U
URL. UO Zx '! 3$Z.
UTF-8. // |D. L |D: 8q. .Z <.8 3.
OB $8 3. C:[L 16q. /OZe& k@OB 8
q.N //Om $8G UG xL L& YC G91 v
V5O UOY.
V
VPN. !s 3Nk W.v).
W
WebSphere Application Server. gkZ! m:I %
gL.& 3_Om |.R v V5O 5MVB IBM &
0. \xQ % x3!- m^ e-business@kANW%!
L # B z $ ; k L O T X ] O Y . WebSphere
Application ServerB % -v W b] n5 <& pN
M 63H Javab] -m4 #x8N Lgn. V@OY.
X
X.500. D;M C:[; s#,aT8Na Yq{ Pj
W 9& p:d. -q:& gkOb 'Q %X. L|!
76 Trust Authority: gkZ H;-
B CCITTN KA. Vx 9& kE \<(ITU)M %X
- 9& b8 W 9& |b -P y8(ISO/IEC)!- T
2 $GQ MTOY.
X.509 v| 3 Nu. X.509v3: Nu @kANW% $
8G ze W Kv, Nu Pj $8, Nu kR $8, $
% $8, pvP -m; 'Q $|'Q %LM 86& !
vm V@OY.
X.509v3 AN<:B pg Nu! Vn- C# RN; g
kOB CRL; [:UOY . NuL gkI '6Y
X.509v3 bI: @kANW%L Xg NuG /?:; !
KR v V5O UOY. GQ @kANW%L Xg CRL
! NuL VBv )N& G0R v V5O UOY.
X.509v3 CRL: v$H /? b#! kX [:R v V
@OY. Nu; +?-R v5 VB Y% /f; b]8
N R v5 V@OY. 9& in Q wxL 6w; 0*
B fl Xg Nu: CRL! uLT KOY.
X.509 Nu. N. ^Fi)vm VB Nu %X8N-,
8H |. W 8H NM] W.v) s!-G pvP -
m NuG Ph& vxOb 'X mHH %X. X.509 N
u: EZR v VB & 3Z! pvPN -mQ xk 0
G Ph& 'Q ANC`n& vkOB %LM 86& $
GUOY.
kn} 77
78 Trust Authority: gkZ H;-
vN
[!]3d 3
;E
nO % dLv!- 14
,sLp. @kANW%!- 21
;E !I: 34
;E !IQ Nu 34
;E R! Nu 34
8P L' 32
[Y]k- sZ 45
g|nO DO gk ET Nu 47
:6. +e nO $8 52
:6. +e -b 50
O# /f 46
Nu ;E 45, 50
Nu ]T 47
Nu ]b 47
Nu h& 46
Nu -b 49
Nu kR 51
.#hG ID& gkOB ET Nu
48
%LM#L: 9Ze, nO 3, 29, 30
S: 31
RA! GQ 3. 3
5| @d 6, 8, 10, 12, 37
nO 29
nO% dLv!- 6
% jslz vx 28
Z?- 29
$% 30
,sLp. @kANW% gk 17
Jd 3
nO b| 3, 29
nO %LM#L: 9Ze 3, 29, 30
S: 31
RA! GQ 3. 3
nO 5^N 30
nO gD Je 37
nO d; 3
nO %LM#L:9Ze 30
nO 5^N 30
nO gD 27
nO % dLv!- 6
sLA gL, 30
g|nO 27
% jslz vx 28
Z? r! 29
,sLp. @kANW%!- 17
r! 29
RA! GQ 3. 3
nO % dLv 3, 6
nO /| 27
nOgD Je 37
g|nO; 'Q C*.@ 27
W<: 5
d; sB !K 12
d; ID 6, 8, 10
CA Nu 33
URL 5
nO $8, :6. +e 25
nO &Q 37
nO, ,sLp. @kANW%
g|nO DO wT 17
.#hG ID wT 18
p:d. W<: 32
pvP Nu 32
;E !I 34
pvP Nu 32 (hS)
;E R! 34
%LM#L: 9Ze 29
nO -q: gk k5 6, 33
nO % dLv!- |. 13
nO % dLv!- d; 6
8b 21, 45
|V 32
h& 18
<NgW 20
d` $8 22
/| 40
,sLp. @kANW%!- |.
18
,sLp. @kANW%!- d;
17
DON ]b 19
DO!- ]T 19
[6]
^:, :6. +e 8b " 43
[Y]
f}... V& 5
8y d;, ,sLp. @kANW% 18
8H @kANW% 35
8H Zx 3, 35
jslz Nu 33
jslz Nu d; 6
jslz vx 28
qnO: $% 29
qnO: AN<: /v 34
© Copyright IBM Corp. 1999b 79
[g]
g|nO 27
g|nO DO gk 17
d; sB !K 12
8:)& 'Q C*.@ 27
.#hG ID gk 18
g|nO DO 12, 17
g|nO DO gk ET Nu k- sZ
47
s# Nu 31
-v Nu 8, 34
=G, nO gD 6, 8, 10
S:, %LM#L: 9Ze 31
UsH 0 42
:6. +e 16, 17, 18, 35
!s +e 16, 24, 35
Y% gk 18
nO $8 25
nO $8 8b 25
0.{ +e 24, 35
O# 24
O# /f 24
-b 24
/v8v 23
Nu ]T 19
Nu ]b 19
Nu L? 19
:6. +e nO $8 k- sZ 52
:6. +e 8b "
k- sZ 45
5r; bI 53
^: 43
- )b 6$ 23
G 22, 44
G gLG L? 23
% 44
%G 8Y 9: ` %C 23
:6. +e -b k- sZ 50
[F]O# /f k- sZ 46
W<: &n qO 35
d` $8, Nu 22
d; ID 6, 8, 10
d;G h&, ,sLp. @kANW%
18
d;, nO 3
nO %LM#L:9Ze 30
nO 5^N 30
nO gD 27
nO % dLv!- 6
sLA gL, 30
g|nO 27
% jslz vx 28
Z? r! 29
,sLp. @kANW%!- 17
r! 29
RA! GQ 3. 3
d;, ,sLp. @kANW%!- h&
18
% jslz vx 27, 28
% dLv, nO 3, 6
nO /| 27
nOgD Je 37
g|nO; 'Q C*.@ 27
W<: 5
d; sB !K 12
d; ID 6, 8, 10
CA Nu 33
URL 5
/? b# 40
Nu 31, 32, 35
;E !I 34
;E R! 34
h~ 31
%LM#L: 9Ze 29
nO -q: gk k5 6, 33
nO % dLv!- |. 13
Nu 31, 32, 35 (hS)
nO % dLv!- d; 6
8b 21, 45
|V 32
h& 18
s# Nu 31
<NgW 20
d` $8 22
/| 40
,sLp. @kANW%!- |.
18
,sLp. @kANW%!- d;
17
DON ]b 19
DO!- ]T 19
Nu ;E k- sZ 45, 50
Nu |.(%sG) 13
;E 14
8y 13
jslz d; 6
g| nO 10
-v* e! d; 8
kR 15
Nu |.(,sLp.!-) 18
;E 21
Y% :6. +eN L? 19
qO 8b 22
8y 20
<NgW 8b 20
-b 20
kR 22
Nu b| 3, 31
Nu sLA gL, 30, 34
Nu 8b 21, 45
Nu qO 22
Nu ]T k- sZ 47
Nu ]b k- sZ 47
Nu 8y
nO % dLv!- 13
,sLp. @kANW%!- 20
80 Trust Authority: gkZ H;-
Nu h& k- sZ 46
Nu -b k- sZ 49
Nu /| 40
Nu kR k- sZ 51
Nu kR qO 31
Nu .e 34
NuG q{ 40
NuG <NgW 20
[Z]e! Nu 8, 34
|Z lm kv 6, 8, 10, 37
$8... V& 27
[w]|6 V& 37
kR
nO % dLv!- 15
g/ 42
,sLp. @kANW%!- 22
kR g/ 42
[+],sLp. @kANW% 3
nO 17, 18
W<: 16
Nu kf; 'Q C*.@ 27
Nu|. 18
>a 25
,sLp. @kANW% k- sZ 45
g|nO DO gk ET Nu 47
:6. +e nO $8 52
:6. +e -b 50
O# /f 46
Nu ;E 45, 50
Nu ]T 47
Nu ]b 47
Nu h& 46
,sLp. @kANW% k- sZ 45
(hS)
Nu -b 49
Nu kR 51
.#hG ID& gkOB ET Nu
48
,sLp. @kANW% nO 17
g|nO DO wT 17
.#hG ID wT 18
,sLp. @kANW% d;, h& 18
,sLp. @kANW% " dR 43
,sLp. @kANW%! kQ 5r;
53
0, Us 42
[8]
G, :6. +e 8b " 22, 44
.#hG ID 18
.#hG ID& gkOB ET Nu k-
sZ 48
[D]
%
8Y 9: ` %C 23
- )b 6$ 23
%, :6. +e 8b " 44
ANd] 32
ANd], p:d. W<: 32
Je, nO gD 37
CCA h~ 31
CA Nu 6, 33
DDB2 29
IIBM SecureWay Trust Authority,d`
1
Internet Explorerjslz Nu 6
LLDAP ANd] 32
NNetscapejslz Nu 6
PPKCS #10Nu d; 34, 37
PKIX Xv @kANW% 10, 32
RRA 29
RA |.Z 27, 29
RA %:)> 27, 29
UURL
nO b| 22
nO 5^N 21, 30
nO % dLv 5
XX.509v3 Nu .e 34
vN 81
82 Trust Authority: gkZ H;-
© Copyright IBM Corp. 1999b 83
IBM
ANW% x#: 5648-D09
SA30-0874-00