73 lines
6.2 KiB
HTML
73 lines
6.2 KiB
HTML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<!DOCTYPE html
|
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
|
<html lang="en-us" xml:lang="en-us">
|
|
<head>
|
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
|
<meta name="security" content="public" />
|
|
<meta name="Robots" content="index,follow" />
|
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
|
<meta name="DC.Type" content="concept" />
|
|
<meta name="DC.Title" content="Object signing scenarios" />
|
|
<meta name="abstract" content="Use this information to review scenarios that illustrate some typical situations for using object signing and signature verification capabilities. Each scenario also provides the configuration tasks you must perform to implement the scenario as described." />
|
|
<meta name="description" content="Use this information to review scenarios that illustrate some typical situations for using object signing and signature verification capabilities. Each scenario also provides the configuration tasks you must perform to implement the scenario as described." />
|
|
<meta name="DC.Relation" scheme="URI" content="rzalzosintro.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzalzdcmsignsc.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzalzapisignsc.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzalzmgmtcntlsc.htm" />
|
|
<meta name="copyright" content="(C) Copyright IBM Corporation 2004, 2006" />
|
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2004, 2006" />
|
|
<meta name="DC.Format" content="XHTML" />
|
|
<meta name="DC.Identifier" content="scenariosoverview" />
|
|
<meta name="DC.Language" content="en-us" />
|
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
|
<!-- US Government Users Restricted Rights -->
|
|
<!-- Use, duplication or disclosure restricted by -->
|
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
|
<title>Object signing scenarios</title>
|
|
</head>
|
|
<body id="scenariosoverview"><a name="scenariosoverview"><!-- --></a>
|
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
|
<h1 class="topictitle1">Object signing scenarios</h1>
|
|
<div><p>Use this information to review scenarios that illustrate some typical
|
|
situations for using object signing and signature verification
|
|
capabilities. Each scenario also provides the configuration tasks you must
|
|
perform to implement the scenario as described. </p>
|
|
<p>Your system
|
|
provides several different methods for signing objects and verifying signatures
|
|
on objects. How you choose to sign objects and how you work with signed objects
|
|
varies based on your business and security needs and objectives. In some cases,
|
|
you may need only to verify object signatures on your system to ensure that
|
|
object integrity is intact. In other cases, you may choose to sign objects
|
|
that you distribute to others. Signing the objects allows others to identify
|
|
the origin of the objects and to check the integrity of the objects. </p>
|
|
<p>Which method you choose to use depends on a variety of factors. The scenarios
|
|
provided in this topic describe some of the more common object signing and
|
|
signature verification objectives within typical business contexts. Each scenario
|
|
also describes any prerequisites and the tasks that you must perform to implement
|
|
the scenario as described. Review these scenarios to help you determine how
|
|
you can use object
|
|
signing capabilities in a way that best suits your business and security needs:</p>
|
|
</div>
|
|
<div>
|
|
<ul class="ullinks">
|
|
<li class="ulchildlink"><strong><a href="rzalzdcmsignsc.htm">Scenario: Use DCM to sign objects and verify signatures</a></strong><br />
|
|
This scenario describes a company that wants to sign vulnerable application objects on their public Web server. They want to be able to more easily determine when there are unauthorized changes to these objects. Based on the company's business needs and security goals, this scenario describes how to use Digital Certificate Manager (DCM) as the primary method for signing objects and verifying object signatures.</li>
|
|
<li class="ulchildlink"><strong><a href="rzalzapisignsc.htm">Scenario: Use APIs to sign objects and verify object signatures</a></strong><br />
|
|
This scenario describes an application development company that wants to programmatically sign the applications that it sells. They want to be able to assure their customers that the applications came from their company and provide them with a means of detecting unauthorized changes to the applications when installing them. Based on the company's business needs and security goals, this scenario describes how to use the Sign Object API and Add Verifier API to sign objects and enable signature verification.</li>
|
|
<li class="ulchildlink"><strong><a href="rzalzmgmtcntlsc.htm">Scenario: Use iSeries Navigator Management Central to sign objects</a></strong><br />
|
|
This scenario describes a company that wants to sign objects that
|
|
it packages and distributes to multiple systems. Based on the company's business
|
|
needs and security goals, this scenario describes how to use iSeries™ Navigator's
|
|
Management Central function to package and sign objects that they distribute
|
|
to other systems.</li>
|
|
</ul>
|
|
|
|
<div class="familylinks">
|
|
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzalzosintro.htm" title="Find information about i5/OS object signing and signature verification security capabilities that you can use to ensure the integrity of objects. Learn how to use one of several i5/OS methods for creating digital signatures on objects to identify the source of the object and provide a means for detecting changes to the object. Also learn how to enhance system security by verifying digital signatures on objects, including operating system objects, to determine whether there have been changes to the contents of the object since it was signed.">Object signing and signature verification</a></div>
|
|
</div>
|
|
</div>
|
|
</body>
|
|
</html> |