McAfee MEJCAE-AM-DA Product Guide - Page 179

Index

Page 179 highlights

Index Symbols +sda option 63 .asc files setting E-Business Server to produce 89 A ADD-ALL parameter 87 adding a designated revoker 35 a Root CA certificate to your keyring 52 an expiration date to a signature 49 an X.509 certificate to your key 52 keys to key servers 26 to your keyring 25 Additional Decryption Keys an overview of 40 appropriate use 40 definition of 40 encrypting to 87 implementing 41 incoming ADKs 40 key policy 40 outgoing ADKs 40 protecting 40 security 40 warn before encrypting to 110 ADK-KEY parameter 87 ADKs See Additional Decryption Keys ALIAS parameter 88 aliases creating 88 ALLOW-PASSPHRASE-RETRY parameter 89 API functions provided 78 library and header files 78 programming on UNIX 84 programming on Win32 84 setting the run-time library path 84 armor option setting on the command line 112 ARMOR parameter 89 ASCII text file sending to a different machine environment 70 signing with your secret key 45 ASCII-armored format 70, 89 converting a file into 70 decrypting messages in 70 E-Business Server™ 8.6 Product Guide sending a public key in 70 sending binary data in 70 atom, definition 160 audience for this manual 5 AUTHENTICATE parameter 89 AUTH-PASSPHRASE parameter 89 AUTH-USER parameter 89 B backing up your keys 22 basic steps for using E-Business Server 9 BATCHMODE parameter 89 binary data encrypting and transmitting 69 binary data files sending in ASCII-armored format 70 branch, definition 159 C cancelling an operation 17 canonical text converting to before encrypting 109 CA-REVOCATION-URL parameter 90 CA-ROOT-CERT parameter 90 CA-TYPE parameter 90 CA-URL parameter 90 CERT-ATTRIBUTE parameter 90 CERT-DEPTH parameter 91 certificate attributes list of Verisign-specific attributes 170 specifying 51 certifying public keys 10 cert-request option setting on the command line 112 cert-retrieve option setting on the command line 113 CHALLENGE-FD parameter 91 changing your passphrase 34 checking a key's validity 47 checking the version installed 14 choosing a key type 18 CIPHER parameter 91 CIPHERNUM parameter 91 CLEARSIG parameter 92 clear-signed message an example of 44 177

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188

E-Business Server
8.6
Product Guide
177
Index
Symbols
+sda option
63
.asc files
setting E-Business Server to produce
89
A
ADD-ALL parameter
87
adding
a designated revoker
35
a Root CA certificate to your keyring
52
an expiration date to a signature
49
an X.509 certificate to your key
52
keys
to key servers
26
to your keyring
25
Additional Decryption Keys
an overview of
40
appropriate use
40
definition of
40
encrypting to
87
implementing
41
incoming ADKs
40
key policy
40
outgoing ADKs
40
protecting
40
security
40
warn before encrypting to
110
ADK-KEY parameter
87
ADKs
See Additional Decryption Keys
ALIAS parameter
88
aliases
creating
88
ALLOW-PASSPHRASE-RETRY parameter
89
API
functions provided
78
library and header files
78
programming on UNIX
84
programming on Win32
84
setting the run-time library path
84
armor option
setting on the command line
112
ARMOR parameter
89
ASCII text file
sending to a different machine environment
70
signing with your secret key
45
ASCII-armored format
70
,
89
converting a file into
70
decrypting messages in
70
sending a public key in
70
sending binary data in
70
atom, definition
160
audience for this manual
5
AUTHENTICATE parameter
89
AUTH-PASSPHRASE parameter
89
AUTH-USER parameter
89
B
backing up
your keys
22
basic steps for using E-Business Server
9
BATCHMODE parameter
89
binary data
encrypting and transmitting
69
binary data files
sending in ASCII-armored format
70
branch, definition
159
C
cancelling an operation
17
canonical text
converting to before encrypting
109
CA-REVOCATION-URL parameter
90
CA-ROOT-CERT parameter
90
CA-TYPE parameter
90
CA-URL parameter
90
CERT-ATTRIBUTE parameter
90
CERT-DEPTH parameter
91
certificate attributes
list of Verisign-specific attributes
170
specifying
51
certifying
public keys
10
cert-request option
setting on the command line
112
cert-retrieve option
setting on the command line
113
CHALLENGE-FD parameter
91
changing your passphrase
34
checking
a key’s validity
47
checking the version installed
14
choosing
a key type
18
CIPHER parameter
91
CIPHERNUM parameter
91
CLEARSIG parameter
92
clear-signed message
an example of
44