In The Spotlight
One technology that has a place in some secure information sharing environments is PKI. Read Part 1, Part 2 and Part 3
by Graham Williamson
Editor’s note: This chapter is excerpted from chapter 9 of Identity Management: A Business Perspective.
Public Key Infrastructure
PKI is a mechanism to add a layer of security to a user’s activity that makes it virtually impossible to circumvent, provided the mechanism for creating and distributing keys is strong enough. A PKI validation of a user’s identity can be trusted to a very high level. Man-in-the-middle attacks are not possible, and communication is secure.