?
Solved

Public Key Infrastructure

Posted on 2009-12-17
5
Medium Priority
?
738 Views
Last Modified: 2013-11-16
Hi,

I want to get good information for Public Key Infrastructure. How it works and how to implement it. I am a dummy for this topic.
0
Comment
Question by:sanfran83
5 Comments
 
LVL 7

Assisted Solution

by:icenick
icenick earned 450 total points
ID: 26074802
0
 
LVL 10

Assisted Solution

by:tdlewis
tdlewis earned 450 total points
ID: 26074811
Here is a good overview of how it works:
http://en.wikipedia.org/wiki/Public_key_infrastructure

What aspect of PKI are you planning to implement?
0
 
LVL 31

Expert Comment

by:Paranormastic
ID: 26075129
A surprisingly good explanation using fingerpuppets:
http://www.carillon.ca/tutorials.php

You can search some of my old posts :)

Another good resource is the 2003 or 2008 server PKI book by Brian Komar.  This will explain PKI, how to set up your CA for different scenarios, and some basic upkeep/maintenance.  For PKI, this is about as user friendly as it gets:
2003:
http://www.microsoft.com/mspress/books/authors/auth6745.aspx

2008:
http://www.microsoft.com/learning/en/us/book.aspx?ID=9549&locale=en-us
0
 
LVL 31

Accepted Solution

by:
Paranormastic earned 600 total points
ID: 26075152
0
 

Author Closing Comment

by:sanfran83
ID: 31667482
Thanks!
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
This article investigates the question of whether a computer can really be cleaned once it has been infected, and what the best ways of cleaning a computer might be (in this author's opinion).
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Suggested Courses

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question