The X.509 specification defines a standard for managing public keys
through a Public Key Infrastructure (PKI). Public keys are maintained in X.509
certificates, which are digital documents that bind a subject’s identity claims
to a public key from a public/private asymmetric key pair. Identity claims are
normally understandable by humans, such as a person’s full name or email
address, or a machine host name or domain name. X.509 certificates are endorsed
and issued by a trusted third party known as a Certificate Authority (CA).
See the following topics for more information:
Use of X.509 Certificates in Patterns
The use of X.509 certificates for third party authentication, data
origin authentication, and data confidentiality is described in the following
Web service security pattern documents:
References
http://www.rsasecurity.com/rsalabs/node.asp?id=2277
http://www.rsasecurity.com/rsalabs/node.asp?id=2293
http://www.oasis-open.org/specs/index.php#wssv1.0
http://www.microsoft.com/technet/prodtechnol/windowsserver2003/operations/ipsec.mspx
Kaufman, C., Perlman, R., and Speciner, M. Network Security – PRIVATE Communication in a PUBLIC World.
Microsoft Confidential. © 2005 Microsoft Corporation.
All rights reserved. By using or providing feedback on these materials, you
agree to the attached license agreement.