Changes

An Overview of Public Key Infrastructures (PKI)

1 byte added, 15:32, 3 March 2008
Registration Authorities (RA)
The specific authentication process used depends of the ''class'' of certificate being requested:
* '''Class 1''' - Involves the verification of an individual via email. A class 1 certificate can be used to digitally sign email messages. Typically requires an email address, full name and physical address. the application process will also walk the applicant through the process of creating a public/private key pair.
* '''Class 2''' - Used to sign software so that a person using the software can verify the authenticity of the software vendor.