A SERVICE OF

logo

Web, mail, and directory services use the public key with SSL to negotiate a shared key
for the duration of the connection.
For example, a mail server will send its public key to a connecting client and initiate
negotiation for a secure connection. The connecting client uses the public key to
encrypt a response to the negotiation. The mail server, because it has the private key,
can decrypt the response. The negotiation continues until the mail server and the
client have a shared secret to encrypt trac between computers.
Certicates
A certicate is an electronic document that contains a public key with identication
information (name, organzation, email address, and so on). In a public key
environment, a certicate is digitally signed by a Certicate Authority, or its own
private key (the latter being a self-signed certicate).
A public key certicate is a le in a specied format (Mac OS X Server uses the x.509
format) that contains:
The public key half of a public-private key pair Â
The key user’s identity information, such as a person’s name and contact information Â
A validity period (how long the certicate can be trusted to be accurate) Â
The URL of someone with the power to revoke the certicate (its  revocation center)
The digital signature of a CA, or the key user Â
About Certicate Authorities (CAs)
A CA is an entity that signs and issues digital identity certicates claiming that a party
is correctly identied. In this sense, a CA is a trusted third party used by other parties
when performing transactions.
In x.509 systems such as Mac OS X, CAs are hierarchical, with CAs being certied by
higher CAs, until you reach a root authority. A root authority is a CA that’s trusted by
the parties, so it doesn’t need to be authenticated by another CA. The hierarchy of
certicates is top-down, with the root authority’s certicate at the top.
A CA can be a company that signs and issues a public key certicate. The certicate
attests that the public key belongs to the owner recorded in the certicate.
In a sense, a CA is a digital notary public. You request a certicate by providing the CA
with your identity information, contact information, and the public key. The CA then
veries your information so users can trust certicates issued for you by the CA.
60 Chapter 4 Enhancing Security