Adobe 22002486 Digital Signature User Guide - Page 32

Adding Someone to Your Trusted Identity List

Page 32 highlights

Acrobat 9 Family of Products Security Feature User Guide Managing Certificate Trust and Trusted Identities Adding Someone to Your Trusted Identity List 32 Figure 21 Digital ID: Managing trusted identities From within the Manage Trusted Identities dialog, users import and manage the certificates and certificate owner data for document recipients they wish to trust. A contact will occasionally be associated with multiple certificates. Therefore, contacts and certificates are in some respects managed independently of each other. It is also possible to create a group from any number of contacts so that security can be applied to all group members with a single action. Users manage contacts, groups, and certificates by choosing Advanced (Acrobat) or Document (Reader) > Manage Trusted Identities and opening the Trusted Identities Manager. Figure 22 Manage Trusted Identities menu item 3.3 Adding Someone to Your Trusted Identity List As shown in Figure 21, you build a list of trusted identities by getting digital ID certificates from those who will be participating in signing and certificate security workflows. You get this information from a server, a file, or from a signed document. For signing workflows, you can get this information during the signature validation process. For certificate security workflows involving encryption, you must request the information ahead of time so you can encrypt the document with the document recipient's public key. 8.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189

Acrobat 9 Family of Products
Managing Certificate Trust and Trusted Identities
Security Feature User Guide
Adding Someone to Your Trusted Identity List
32
Figure 21
Digital ID: Managing trusted identities
From within the Manage Trusted Identities dialog, users import and manage the certificates and certificate
owner data for document recipients they wish to trust. A contact will occasionally be associated with
multiple certificates. Therefore, contacts and certificates are in some respects managed independently of
each other. It is also possible to create a group from any number of contacts so that security can be applied
to all group members with a single action. Users manage contacts, groups, and certificates by choosing
Advanced
(Acrobat) or
Document
(Reader)
> Manage Trusted Identities
and opening the Trusted
Identities Manager.
Figure 22
Manage Trusted Identities menu item
3.3
Adding Someone to Your Trusted Identity List
As shown in
Figure 21
, you build a list of trusted identities by getting digital ID certificates from those who
will be participating in signing and certificate security workflows. You get this information from a server, a
file, or from a signed document. For signing workflows, you can get this information during the signature
validation process. For certificate security workflows involving encryption, you must request the
information ahead of time so you can encrypt the document with the document recipient’s public key.
8.