User guide

Index-1
Index
access control, B-4
Acquiring and Registering Certificates (for both the
Server and Client), 10-4
Append a User Name and a Password, 15-2
Appending a User Name and a Password to a SOAP
Message, 15-2
Authentication
User, 3-2
Authentication object log
tracing, B-15
authentication objects, B-2
backup
security, 2-2
CA (Certification Authority), 7-4
certificate
acquiring, 8-9
registering, 8-10
certificate issuance
requesting, 7-10
certificate management, 7-19
Certificate Management, 7-19
certificate signing request (CSR)
creating, 7-9
certificate/key management environment, 8-3
creating, 8-7
environment setting, 8-5
managing, 8-14
SSL libraries used with, 8-2
certificates, 7-2
defining use of, 7-17
certificates and CRL
registering, 7-10
Certificates and Private Keys, 7-2
client certificate
obtaining, 8-12
operating, 8-11
registering, 8-12
Component Transaction Service, A-9
security, B-14
Component Transaction Service Security
access control, B-7
authentication object, B-5
overview, B-5
user authentication, B-5
user registration, B-6
using Infordirectory Server, B-5
config file
editing, 10-8
Configuration Management function
possible security risks, 1-42
resources to be protected, 1-41
security, 1-41
threat countermeasures, 1-42
usage model, 1-41
Configuration Model, 1-28
configuring
Interstage certificate environment, 7-5
Configuring an Interstage Certificate Environment
and Creating a Certificate Signing Request (CSR),
7-9
Configuring Certificate Settings, 7-17
Configuring Environments, 7-5
Configuring the Interstage Certificate Environment, 7-
13