Allows companies to secure data and authenticate the data/users Providers of PKI functionality enable cryptography and certificate capabilities into entities within a VPN Created by a trusted CA Public key certificate associated with user Utilizes hierarchical trust model Directory server not responsible for creation of public key or certification http://www.bestitdocuments.com/Services.html
↧