Adobe 22002486 Digital Signature User Guide - Page 180

As of Acrobat 9, Adobe Policy Server is renamed to Adobe LiveCycle Rights Management Server

Page 180 highlights

Acrobat 9 Family of Products Security Feature User Guide Glossary of Security Terms 180 Table 5 Security Terms MSCAPI OCSP Online Certificate Status Protocol (OCSP) Windows Microsoft Crypto API (MSCAPI) is the API that the application uses to access cryptographic service providers such as PFX files and PKCS#11 files. MSCAPI is also used by the application anytime it uses a Windows security feature. See Online Certificate Status Protocol. OCSP defines a protocol for determining the revocation status of a digital certificate without requiring a CRL. Unlike CRL, OCSP obviates the need to frequently download updates to keep certification status lists current. Acrobat's OCSP revocation checker adheres to RFC 2560. organization digital ID, desktop A digital ID issued to an organization or non-human entity (for example, the Adobe Public Relations Department). It can be used by an authorized employee to perform signing operations, at the desktop, on behalf of the company. organization digital ID, server A digital ID issued on behalf of an organization or non-human entity (e.g. Adobe Public Relations Department, Cisco Corporation, etc.) for performing server-based, automated signing operations. PKCS PKCS#11 device A group of Public Key Cryptography Standards authored by RSA Security External hardware such as a smart card reader or token. It is driven by a module (a software driver such as a .dll file on Windows). PKCS#11 digital ID PKCS#11 format An ID on a PKCS# device. A device may contain one or more IDs. Cryptographic Token Interface Standard: An encryption format used by smart cards, tokens, and other PKCS#11-compatible devices. The ID is stored on the device rather than on the user's computer. PKCS#11 module PKCS#11 token PKCS#12 The software module that drives a PKCS#11 device. See PKCS#11 device. Personal Information Exchange Syntax Standard: Specifies a portable, password protected, and encrypted format for storing or transporting certificates. The certificates are stored in .pfx (Windows) and .p12 (Macintosh) files. Unlike other formats, the file may contain private keys. PKCS#7 Policy Server Certificate Message Syntax (CMS): Files with .p7b and .p7c extensions are registered by the Windows OS. If you double click on a .p7c file it will be viewed by a Windows application. As of Acrobat 9, Adobe Policy Server is renamed to Adobe LiveCycle Rights Management Server privileged context qualified certificates qualified electronic signatures roaming ID root certificate A context in which you have the right to do something that's normally restricted. Such a right (or privilege) could be granted by executing a method in a specific way (through the console or batch process), by some PDF property, or because the document was signed by someone you trust. For example, trusting a document certifier's certificate for executing JavaScript creates a privileged context which enables the JavaScript to run where it otherwise would not. A qualified certificate that conforms to the RFC 3739 specification. It contains a qc statement that simply states that it is a qualified certificate. These types of certificates meet the requirements of the German digital signature law, and most qualified certificates currently originate from German trust centers. Electronic signatures that use a qualified certificate valid at the time of their creation and that have been produced with a secure signature-creation device. A roaming ID is a digital ID that is stored on a server. The private key always remains on the server, but the certificate and its public key can be downloaded at the subscriber's request to any location. Roaming IDs require an Internet connection. The top-most issuing certificate in a certificate chain. It is sometimes used as a trust anchor. secure signature-creation devices security restricted property or method (SSCD) Software or hardware products used to store and apply signature code and that are designed for qualified electronic signatures A property or method whose availability is restricted to certain events such as batch processing, console execution, or application startup. For example, in Acrobat 7.0, a security-restricted method (S) can only be executed through a menu event if one of the following is true: The JavaScript user preferences item "Enable menu items JavaScript execution privileges" is checked or the method is executed through a trusted function. The JavaScript for Acrobat API Reference identifies the items that have restrictions.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189

Acrobat 9 Family of Products
Glossary of Security Terms
Security Feature User Guide
180
MSCAPI
Windows Microsoft Crypto API (MSCAPI) is the API that the application uses to access cryptographic
service providers such as PFX files and PKCS#11 files. MSCAPI is also used by the application anytime it
uses a Windows security feature.
OCSP
See Online Certificate Status Protocol.
Online Certificate Status
Protocol (OCSP)
OCSP defines a protocol for determining the revocation status of a digital certificate without requiring a
CRL. Unlike CRL, OCSP obviates the need to frequently download updates to keep certification status
lists current. Acrobat’s OCSP revocation checker adheres to RFC 2560.
organization digital ID, desktop
A digital ID issued to an organization or non-human entity (for example, the Adobe Public Relations
Department). It can be used by an authorized employee to perform signing operations, at the desktop,
on behalf of the company.
organization digital ID, server
A digital ID issued on behalf of an organization or non-human entity (e.g. Adobe Public Relations
Department, Cisco Corporation, etc.) for performing server-based, automated signing operations.
PKCS
A
group of Public Key Cryptography Standards authored by RSA Security
PKCS#11 device
External hardware such as a smart card reader or token. It is driven by a module (a software driver such
as a .dll file on Windows).
PKCS#11 digital ID
An ID on a PKCS# device. A device may contain one or more IDs.
PKCS#11 format
Cryptographic Token Interface Standard: An encryption format used by smart cards, tokens, and other
PKCS#11-compatible devices. The ID is stored on the device rather than on the user’s computer.
PKCS#11 module
The software module that drives a PKCS#11 device.
PKCS#11 token
See PKCS#11 device.
PKCS#12
Personal Information Exchange Syntax Standard: Specifies a portable, password protected, and
encrypted format for storing or transporting certificates. The certificates are stored in .pfx (Windows)
and .p12 (Macintosh) files. Unlike other formats, the file may contain private keys.
PKCS#7
Certificate Message Syntax (CMS): Files with .p7b and .p7c extensions are registered by the Windows OS.
If you double click on a .p7c file it will be viewed by a Windows application.
Policy Server
As of Acrobat 9, Adobe Policy Server is renamed to Adobe LiveCycle Rights Management Server
privileged context
A context in which you have the right to do something that’s normally restricted. Such a right (or
privilege) could be granted by executing a method in a specific way (through the console or batch
process), by some PDF property, or because the document was signed by someone you trust. For
example, trusting a document certifier’s certificate for executing JavaScript creates a privileged context
which enables the JavaScript to run where it otherwise would not.
qualified certificates
A qualified certificate that conforms to the RFC 3739 specification. It contains a qc statement that simply
states that it is a qualified certificate. These types of certificates meet the requirements of the German
digital signature law, and most qualified certificates currently originate from German trust centers.
qualified electronic signatures
Electronic signatures that use a qualified certificate valid at the time of their creation and that have been
produced with a secure signature-creation device.
roaming ID
A roaming ID is a digital ID that is stored on a server. The private key always remains on the server, but
the certificate and its public key can be downloaded at the subscriber’s request to any location. Roaming
IDs require an Internet connection.
root certificate
The top-most issuing certificate in a certificate chain. It is sometimes used as a trust anchor.
secure signature-creation
devices
(SSCD) Software or hardware products used to store and apply signature code and that are designed for
qualified electronic signatures
security restricted property or
method
A property or method whose availability is restricted to certain events such as batch processing, console
execution, or application startup. For example, in Acrobat 7.0,
a security-restricted method (S) can only
be executed through a menu event if one of the following is true: The JavaScript user preferences item
“Enable menu items JavaScript execution privileges” is checked or the method is executed through a
trusted function. The
JavaScript for Acrobat API Reference
identifies the items that have restrictions.
Table 5
Security Terms