Components Of Pki
10 community-sourced questions and answers. Free — no login.
Components of PKI
PKI" stands for Public Key Infrastructure. And it's a way to describe the policies, the procedure, the hardware, the software, and the people that are used to manage digital certificates. This means the process of creating, distributing, managing, storing, and revoking certificates is all encapsulated under PKI. From that description alone, you can tell that this is a large undertaking that has many different decisions that need to be made during its implementation. This is not something where you would install some software and make certificates in a matter of minutes. Instead, there's going to be a number of conversations and meetings that take place, to determine how you want to implement the PKI in your environment.
CA (Certificate Authority)
"PKI" also refers to the associations we make with a public key to a person, or a public key to a device. It's all based on trust, and this trust is created by a certificate authority, or a CA.
Intermediate CA
An intermediate CA certificate is a subordinate certificate issued by the trusted root specifically to issue end-entity server certificates. The result is a trust-chain that begins at the trusted root CA, through the intermediate and finally ending with the SSL certificate issued to you. Such certificates are called chained root certificates. The usage of an intermediate certificate thus provides an added level of security as the CA does not need to issue certificates directly from the CA root certificate.
CRL (Certificate Revocation List)
A Certificate Revocation List (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority (CA) before their scheduled expiration date and should no longer be trusted.
OCSP (Online Certificate Status Protocol)
The Online Certificate Status Protocol (OCSP) is an Internet protocol used to determine the state of an identified certificate. How does it work? An OCSP client (i.e. browser) will send a status request to an OCSP responder and receive information if the certificate is valid or revoked. A good response will indicate the certificate is valid and not revoked. A revoked status will indicate the certificate has been revoked. What are the benefits of OCSP over certificate revocation lists (CRL)? OCSP can provide more timely information regarding the revocation status of a certificate. OCSP removes the need for clients to retrieve the CRL themselves (better bandwidth management). OCSP allows users with an expired certificate a grace period (decreasing any downtime with expired certificates).
CSR (Certificate Signing Request)
In public key infrastructure (PKI) systems, a certificate signing request (also CSR or certification request) is a message sent from an applicant to a certificate authority in order to apply for a digital identity certificate.
Certificate
A Digital Certificate is an electronic "password" that allows a person, organizaion to exchange data securely over the Internet using the public key infrastructure (PKI). Digital Certificate is also known as a public key certificate or identity certificate.
Public Key
a cryptographic key that can be obtained and used by anyone to encrypt messages intended for a particular recipient, such that the encrypted messages can be deciphered only by using a second key that is known only to the recipient (the private key ).
Private Key
A private key is a tiny bit of code that is paired with a public key to set off algorithms for text encryption and decryption. It is created as part of public key cryptography during asymmetric-key encryption and used to decrypt and transform a message to a readable format. ... A private key is also known as a secret key.
OID (Object Identifier)
Object Identifiers. An object identifier, or OID, is a sequence of numbers separated by periods, like "1.23.456.7.89". OIDs are used in many areas of technology, and you may have come across them if you have done any work in network management or PKI as they are heavily used in SNMP and digital certificates.
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials