Timothy J. Miller a écrit :
> There is no getting around the enrollment trust problem.  Most
> sensible smartcard and PKI deployments handle this via an enrollment
> ceremony that involves a face-to-face component.
As for enrollment trust problem, IMHO, using the secure channel is good
alternative to the face-to-face .
>From the technical point of view, a distant enrollment with secure
channel can be more secure
then face-to-face enrollment without secure channel .

Regards,
Viktor.



>
> -- TIm
>
> On Jul 2, 2007, at 1:59 PM, Alon Bar-Lev wrote:
>
>> On 7/2/07, Jim Rees <[EMAIL PROTECTED]> wrote:
>>> We do something like this to translate kerberos tickets into
>>> cert/key usable
>>> from pkcs11.  But it only makes sense if you have some way to
>>> convince the
>>> CA that it should sign the keypair and issue a cert.  In our case
>>> that's
>>> kerberos.  Otherwise, how can anyone trust the cert?
>>
>> But Kerberos is weaker than PKI in term of authentication.
>> You can use PKI in order to authenticate to Kerberos.
>> So you have static certificate for user and dynamic authorization
>> using kerberos.
>>
>> Alon.
>> _______________________________________________
>> opensc-devel mailing list
>> opensc-devel@lists.opensc-project.org
>> http://www.opensc-project.org/mailman/listinfo/opensc-devel
>
> ------------------------------------------------------------------------
>
> _______________________________________________
> opensc-devel mailing list
> opensc-devel@lists.opensc-project.org
> http://www.opensc-project.org/mailman/listinfo/opensc-devel

_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to