From the course: Complete Guide to Cybersecurity: A Practical Approach

Unlock this course with a free trial

Join today to access over 24,500 courses taught by industry experts.

Introducing certificate authorities (CAs) and certificate enrollment

Introducing certificate authorities (CAs) and certificate enrollment

From the course: Complete Guide to Cybersecurity: A Practical Approach

Introducing certificate authorities (CAs) and certificate enrollment

- [Instructor] Digital certificates are used to authenticate the identity of individuals, organizations, or devices in a secure manner. They are issued by trusted third-party organizations or software called a certificate authority, and they contain information such as the name of the certificate holder, the public key associated with the certificate, and the digital signature of the certificate authority or the CA. So whenever I mention CA, you know that I'm referring to certificate authority. So whenever you issue a digital certificate, the CA verifies identity of the certificate holder through a process called the certificate enrollment. This typically involves verifying identity of the applicant through, you know, different identification mechanisms and procedures. And once identity of the certificate holder is verified, the CA will then create a digital certificate and signs it using its own private key. Then the signed certificate includes the public key of the certificate…

Contents