First, remember that signatures don't use encryption (well, not in the same way) so that signatures are most certainly allowed in PDF/A (parts 1, 2 and 3). In PDF/A-1, we don't speak at all about signatures and they are simply there as defined by PDF 1.4. However, PDF/A-2 and PDF/A-3 both have very detailed sections on Digital Signatures and PDF/A, based on the PAdES (ETSI TS 102778) standard.
Signing PDF/A is VERY IMPORTANT... Leonard On 6/27/11 5:20 PM, "1T3XT BVBA" <[email protected]> wrote: >On 27/06/2011 17:14, mkl wrote: >> 1T3XT BVBA wrote: >>> PDF/A excludes the use of encryption algorithms, doesn't it? >>> Then how exactly would you sign a PDF and keep it conform with PDF/A? >> You might want to take a look at the PDF/A Competence Center Technical >>Note >Interesting! >I failed to see why one would want to sign a PDF/A document, because >there's no obligation for PDF/A compliant readers to be able to verify >the signature. >But the note made it clear it's possible to sign a PDF/A document anyway. >Thanks! > >-------------------------------------------------------------------------- >---- >All of the data generated in your IT infrastructure is seriously valuable. >Why? It contains a definitive record of application performance, security >threats, fraudulent activity, and more. Splunk takes this data and makes >sense of it. IT sense. And common sense. >http://p.sf.net/sfu/splunk-d2d-c2 >_______________________________________________ >iText-questions mailing list >[email protected] >https://lists.sourceforge.net/lists/listinfo/itext-questions > >iText(R) is a registered trademark of 1T3XT BVBA. >Many questions posted to this list can (and will) be answered with a >reference to the iText book: http://www.itextpdf.com/book/ >Please check the keywords list before you ask for examples: >http://itextpdf.com/themes/keywords.php ------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2d-c2 _______________________________________________ iText-questions mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/itext-questions iText(R) is a registered trademark of 1T3XT BVBA. Many questions posted to this list can (and will) be answered with a reference to the iText book: http://www.itextpdf.com/book/ Please check the keywords list before you ask for examples: http://itextpdf.com/themes/keywords.php
