Trending PKI Discussions

Follow

Ask the Community


Ask any professional question and get answers from other specialists.

Stream language
Khaled Omar's image
Question added by Khaled Omar Senior Service Delivery Engineer Dell Technologies
10 years ago
Answers:
2
Followers:
Views:
272
Vote Count:
2
Answer should contain a minimum of 25 characters.
Khaled Omar's image
Question added by Khaled Omar Senior Service Delivery Engineer Dell Technologies
11 years ago
Answers:
2
Followers:
Views:
177
Vote Count:
2
Answer should contain a minimum of 25 characters.
Abdulrhman Neef Marzouq Alkhaldi's image
Question added by Abdulrhman Neef Marzouq Alkhaldi Sr.lab Tech Sadara
7 years ago
Answers:
0
Followers:
Views:
24
Vote Count:
0
Answer should contain a minimum of 25 characters.
Default profile image  
Answer added by  Saqib Mehmood , Technical Team Lead/Safety Supervisor, Xchange Technology Group
10 years ago

A public-key infrastructure (PKI) is a system for the creation, storage, and distribution of digital certificates which are used to verify that a particular public key be ... See More

Abdullah Al-Bataineh's image  
Answer added by  Abdullah Al-Bataineh, Senior NOC Engineer, viacloud
10 years ago

CA Server can issue the following type of Certificates: 1. Personal Certificates. 2. Server Certificates. 3. Software Publisher Certificates. 4. Certificate Authority Cer ... See More

Khaled Omar's image  
Answer added by  Khaled Omar, Senior Service Delivery Engineer, Dell Technologies
11 years ago

It is based on Asymmetric-Key cryptography algorithm, where each user has two paired-keys, one is know by all users and is called "Public Key" and the other one ... See More

Zayd Sawalmah's image  
Answer added by  Zayd Sawalmah, Security Systems Administration team lead, Symantec
7 years ago

The most common certificates used :   Standard  SSL Standard EV SSL (extended validation)Premium SSL Premium EV SSL Code Signing for Authenticode® Code signing for Java E ... See More