On 30 Aug 2005 05:36:14 -0700, honzab <[EMAIL PROTECTED]> wrote:
It depends. Do you need third party identity verification? What is the value of protecting the root key (do you have a hardened key storage device if you need one)? Is privacy a concern?
ram
We decided to use one Certificate Authority (certificate+private key)
to sign all certificates in our network. Every peer registred in our
network will obtain its own certificate signed by this CA and will
trust all certificates signed with this CA too.
It depends. Do you need third party identity verification? What is the value of protecting the root key (do you have a hardened key storage device if you need one)? Is privacy a concern?
ram
