PKI Tutorial Video
This PKI Tutorial Video provides a description of the elements required to create a secure Public Key Infrastructure (PKI) to issue, manage and revoke certificates.
It provides an overview of a Certificate Authority and how it digitally signs certificates. It continues with how resources use hashing and the Certificate Authority’s public-private key pair to ensure certificates are valid.
It concludes with a discussion of revocation checking via a Certificate Revocation List (CRL) or an Online Certificate Status Protocol (OCSP) responder.
For more information on how PKI is used to secure authentication tokens download TELEGRID’s whitepaper Authentication Token Cybersecurity and NIST 800-63-3