docs.attachmate.com

Website:http://docs.attachmate.com
Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (32)

1

0 Thumbs up   0 Thumbs down

authentication


The process of reliably determining the identity of a communicating party. Identity can be proven by something you know (such as a password), something you have (such as a private key or token), or so [..]
Source: docs.attachmate.com

2

0 Thumbs up   0 Thumbs down

ca


A server, in a trusted organization, which issues digital certificates. The CA manages the issuance of new certificates and revokes certificates that are no longer valid for authentication. A CA may a [..]
Source: docs.attachmate.com

3

0 Thumbs up   0 Thumbs down

cipher


A cipher is an encryption algorithm. The cipher you select determines which mathematical algorithm is used to obscure the data being sent after a successful Secure Shell connection has been establishe [..]
Source: docs.attachmate.com

4

0 Thumbs up   0 Thumbs down

crl


A digitally signed list of certificates that have been revoked by the Certification Authority. Certificates identified in a CRL are no longer valid.
Source: docs.attachmate.com

5

0 Thumbs up   0 Thumbs down

data integrity


The assurance that data has not been changed from its original source. Methods to preserve data integrity are designed to ensure that data has not been accidentally or maliciously modified, altered or [..]
Source: docs.attachmate.com

6

0 Thumbs up   0 Thumbs down

digital certificate


An integral part of a PKI (Public Key Infrastructure). Digital certificates (also called X.509 certificates) are issued by a certificate authority (CA), which ensures the validity of the information i [..]
Source: docs.attachmate.com

7

0 Thumbs up   0 Thumbs down

digital signature


Used to confirm the authenticity and integrity of a transmitted message. Typically, the sender holds the private key of a public/private key pair and the recipient holds the public key. To create the [..]
Source: docs.attachmate.com

8

0 Thumbs up   0 Thumbs down

encryption


Encryption is the process of scrambling data by use of a secret code or cipher so it is unreadable except by authorized users. Encrypted data is far more secure than unencrypted data.
Source: docs.attachmate.com

9

0 Thumbs up   0 Thumbs down

gssapi


An application programming interface that provides programs with access to security services.
Source: docs.attachmate.com

10

0 Thumbs up   0 Thumbs down

hash


Also called a message digest, a hash or hash value is a fixed-length number generated from variable-length digital data. The hash is substantially smaller than the original data, and is generated by a [..]
Source: docs.attachmate.com


To view all 32 definitions, please sign in.