Summary
In this chapter, we have learned about the importance of PKI, we have taken a look at a typical PKI hierarchy. We have been able to understand the roles played by CAs and registration authorities (RAs).
We have taken a look at certificate types, including wildcard certificates, extended validation, multi-domain, and general-purpose certificates. We have gained an understanding of the common usages for certificates, including client authentication, server authentication (application servers), digital signatures, and code signing. We have taken a look at important extensions used when publishing certificates, including CN and SAN.
We have taken a look at the requirements needed to become a trusted CA, how providers are audited, and what is required to maintain trusted status.
We have looked at common trust models used when CAs need to work together and have understood the importance of the cross-certification trust model.
We have understood why is important to address...