Object Identifiers (OIDs), 610
Object quotas, 364–67
assigning, 365
defined, 364
enforcing, 365–66
error, 367
setting, 366
specification, 364
storage, 365
testing, 366
See also Active Directory (AD)
Object type-based ACEs, 345–54
in ACL editor, 347
defined, 345
illustrated, 346
inheritance and, 354
See also Access control entries (ACEs)
Offline CAs, 612–13
CDPs of, 621
publishing CRLs of, 621
Offline files/folders, 657–59
defined, 657
enabling, 658
viewing encryption details for, 658
One-way trust relationships, 70
Online Certificate Status Protocol (OCSP), 592
Opaque signing, 674–75, 676
Open Digital Rights Language (ODRL), 431
Organizational needs assessment, 604–7
business requirements analysis, 604–5
insourcing vs. outsourcing, 606–7
PKI-enabled applications, 605–6
See also Building PKIs
Organizational security, 631
Organizational units (OUs), 382–83
dealing with, 382
defined, 382
hierarchy example, 382
nesting, 383
See also Administrative delegation
Outlook Web Access (OWA), 670
S/MIME capabilities, 672
S/MIME support, 673, 674
Outsourced PKI solutions, 607