Adobe 22002486 Digital Signature User Guide - Page 38

Using Directory Servers to Add Trusted Identities

Page 38 highlights

Acrobat 9 Family of Products Security Feature User Guide Managing Certificate Trust and Trusted Identities Using Certificates for Certificate Security (Encryption) 38 certificate was issued by VeriSign, you would not want to make VeriSign a trusted root unless you wanted to trust every certificate that chains up to VeriSign.  Signed documents or data: Trusts the certificate for approval signatures. Tip: This setting is disabled because if the certificate is set as a trust anchor. Trust anchors are automatically trusted for approval signatures.  Certified documents: Trusts the certificate for certification signatures.  Dynamic content: Trusts multimedia and other dynamic content in certified documents. Selecting this option automatically adds documents that are certified with this certificate to the Trusted Documents list which is maintained by the Multimedia Trust Manager. For this reason, verify your application environment is configured correctly. For details, "Controlling Multimedia" on page 136.  Embedded high privilege JavaScript: Trusts embedded scripts. Certificate settings do not override application-level settings, so even if JavaScript is enabled for a particular certificate, it may not execute unless the application's preferences allow it. This option requires that the application environment be configured correctly. For details, see "Setting JavaScript Options" on page 139.  Privileged system operations (networking, printing, file access, etc.: Some operations represent a security risk more serious than others. Acrobat considers the following operations potential threats to a secure application operating environment: Internet connections, cross domain scripting, silent printing, external-object references, and FDF data injection. If this checkbox is checked, documents that are certified with this certificate will allow these actions. Tip: This feature interacts with the Enhanced Security preferences which may be set by choosing Edit > Preferences > Security (Enhanced). The application always takes the least restrictive setting when determining what is allowed. For example, if the trust level for this certificate does not allow privileged operations but the certified file resided in a privileged location, then these operations will be permitted. 3. If you need to specify a policy restriction, do so. Most users only need to set policy restrictions at the request of their administrator. "Setting Certificate Policy Restrictions" on page 39. 4. Choose OK twice. 5. Choose Close. 3.4.1 Using Certificates for Certificate Security (Encryption) You only need to specify a certificate's encryption usage if you are using certificate security. When more than one certificate is associated with the contact, you can select which one to use as the default encryption certificate. For details, see "Certificate Security" in the Document Security User Guide. 3.5 Using Directory Servers to Add Trusted Identities Businesses often use a centrally managed certificate repository such as an LDAP directory server. Directory servers are capable of returning X.509 public key certificates. These servers are searchable so that you can easily expand your list of trusted identities. Both Adobe Acrobat and Adobe Reader for Windows ship with default servers:

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189

Acrobat 9 Family of Products
Managing Certificate Trust and Trusted Identities
Security Feature User Guide
Using Certificates for Certificate Security (Encryption)
38
certificate was issued by VeriSign, you would not want to make VeriSign a trusted root
unless you wanted to trust every certificate that chains up to VeriSign.
Signed documents or data
: Trusts the certificate for approval signatures.
Tip:
This setting is disabled because if the certificate is set as a trust anchor. Trust anchors are
automatically trusted for approval signatures.
Certified documents
: Trusts the certificate for certification signatures.
Dynamic content
: Trusts multimedia and other dynamic content in certified documents.
Selecting this option automatically adds documents that are certified with this certificate to the
Trusted Documents list which is maintained by the Multimedia Trust Manager. For this reason,
verify your application environment is configured correctly. For details,
“Controlling Multimedia”
on page 136
.
Embedded high privilege JavaScript
: Trusts embedded scripts. Certificate settings do not
override application-level settings, so even if JavaScript is enabled for a particular certificate, it
may not execute unless the application’s preferences allow it. This option requires that the
application environment be configured correctly. For details, see
“Setting JavaScript Options” on
page 139
.
Privileged system operations (networking, printing,
file access, etc.
: Some operations
represent a security risk more serious than others. Acrobat considers the following operations
potential threats to a secure application operating environment: Internet connections, cross
domain scripting, silent printing, external-object references, and FDF data injection. If this
checkbox is checked, documents that are certified with this certificate will allow these actions.
Tip:
This feature interacts with the Enhanced Security preferences which may be set by
choosing
Edit > Preferences > Security (Enhanced)
. The application always takes the
least restrictive setting when determining what is allowed. For example, if the trust level
for this certificate does not allow privileged operations but the certified file resided in a
privileged location, then these operations will be permitted.
3.
If you need to specify a policy restriction, do so. Most users only need to set policy restrictions at the
request of their administrator.
“Setting Certificate Policy Restrictions” on page 39
.
4.
Choose
OK
twice.
5.
Choose
Close
.
3.4.1
Using Certificates for Certificate Security (Encryption)
You only need to specify a certificate’s encryption usage if you are using certificate security. When more
than one certificate is associated with the contact, you can select which one to use as the default
encryption certificate. For details, see “Certificate Security” in the
Document Security User Guide
.
3.5
Using Directory Servers to Add Trusted Identities
Businesses often use a centrally managed certificate repository such as an LDAP directory server. Directory
servers are capable of returning X.509 public key certificates. These servers are searchable so that you can
easily expand your list of trusted identities. Both Adobe Acrobat and Adobe Reader for Windows ship with
default servers: