Updating security certificate unix

Rated 3.93/5 based on 500 customer reviews

is the world's leading file encryption and digital signature utility.

Interoperable across a wide range of platforms (Windows, Linux, Mac OS X, and most UNIX systems), it's the perfect solution for your data-at-rest or data-in-transit security requirements, regardless of the size of your organization.

Employing the latest cryptographic standards, Secret Agent 6.0 provides a more intuitive graphical user interface, with integrated add-in modules for the management of user certificates (and LDAP directory queries), optional Spy Proof!

functionality, and the authoring of security policy files for system administrators.

According to the Certification Memo, JITC has found Secret Agent to be compliant with "the applicable requirements defined in Department of Defense Class 3 Public Key Infrastructure Public Key-Enabled Application Requirements," 1.0, 13 July 2000.

(The October 2002 JITC Interoperability Test Summary for Secret Agent 5.6 for its Do D PKI interoperability certification is also available.) Secret Agent fully satisfies NIST FIPS 140-2 and Do D/CNSS NSTISSP No.

The installation is easy and the solution proved to be both intuitive and user-friendly.

However, functionally they are authentication credentials and need to be managed as such. They are analogous to locks that the corresponding private key can open.

Secret Agent 6.0 for Windows, Linux, Mac OS X, and other UNIX platforms Secret Agent Mobile for Pocket PC/Windows Mobile Feature Comparison Summary for Secret Agent on various platforms (updated 3/23/09) Command line executable and linkable library versions of Secret Agent are also available on all supported platforms.

Secret Agent uses standard X.509 version 3 certificates for encryption; CRL usage, retrieval and auto-updating via CRL distribution points are optional.

More detailed information about Secret Agent's compliance with relevant federal and industry cryptographic standards is available here.

Some information on the use of Secret Agent to achieve HIPAA compliance is here.

Leave a Reply