Abstract
Any cryptography system requires some way to manage certificate request and retrieval. The old approach was to do this via browser mechanisms. There were some serious security issues with this, and not all cryptographic systems use browsers. There are several certificate management protocols to address this issue. With a good certificate management protocol, it is possible to fully automate certificate management. For example, I created a way for an Outlook E-mail client to request a certificate from a CA, retrieve it, and install it for use in Outlook. It also built a shared address book in Active Directory and optionally provide private key escrow. This vastly simplifies deployment of secure e-mail.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature
About this chapter
Cite this chapter
Hughes, L.E. (2022). Certificate Management Protocols. In: Pro Active Directory Certificate Services. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-7486-6_9
Download citation
DOI: https://doi.org/10.1007/978-1-4842-7486-6_9
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-7488-0
Online ISBN: 978-1-4842-7486-6
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)