| < Day Day Up > |
|
KA (Kerberos master key), 1-13
KDC (Key Distribution Center), 1-13—1-14
Kerberos authentication, 1-10, 1-13—1-15
IPSec infrastructure, 8-19, 9-41—9-42, 15-20
KDC (Key Distribution Center), 1-13—1-14
ticket policies, 1-22—1-23, 3-10
Kerbtray.exe tool, 1-16
Key Additions/Deletions parameters, 9-22
Key Distribution Center. See KDC (Key Distribution Center)
key encryption, 7-1, 7-3
asymmetric key encryption, 7-4
certificate archives and recovery, 7-46—7-50, 7-50—7-52, 7-54
certificate management, 7-6, 7-8, 7-24, 7-31—7-38, 7-61—7-70, 11-23
Certificate Services, 7-8—7-13, 16-31
certificate template management, 7-19—7-30, 7-64, 7-65
IPSec vs. SSL, 11-4
LDAP queries, 11-26—11-27, 11-34—11-37
LLTP protocol, 12-6
mail servers, 11-31—11-33
Microsoft Outlook, 11-33—11-34
passwords, 1-19
port numbers for protocols, 11-7
PPTP protocol, 12-6
private keys, exporting, 7-48
public key infrastructure (PKI), 7-3—7-18, 7-46—7-47, 8-19—8-20, 15-20
SQL Server, 11-27—11-31
SSL with IIS, 4-37—4-38, 11-10—11-25, 15-50
TSL network encryption, Exchange Server, 4-44—4-45
WEP (Wired Equivalent Privacy), 10-4—10-11, 12-12, 15-42
WPA, options for, 10-12
key pairs, certificates, 7-31
key recovery agents (KRAs), 7-47, 7-51, 16-31
keys, certificate. See certificates
kiosk security, 4-9—4-10
Klist.exe tool, 1-16
Knowledge Base articles, 5-8
KRAs (key recovery agents), 7-47, 7-51, 16-31
| < Day Day Up > |
|