Glossary
A
- API Client
-
A service account configured in MTG CLM that enables programmatic access to certificate operations through REST APIs.
- Approval Workflow
-
A multistep process requiring authorization from designated approvers before sensitive certificate operations can be completed.
- Audit Logging
-
Comprehensive recording of all certificate-related activities, including issuance, renewal, revocation, and administrative actions for compliance and forensic analysis.
- Authentication
-
The process of verifying the identity of users, devices, or services requesting access to certificate management operations.
B
- Basic Authentication
-
A simple HTTP authentication method using username and password credentials, as defined in RFC 7617.
- Bridge CA
-
A Certificate Authority that acts as a central point connecting multiple PKI hierarchies, simplifying complex trust relationships.
C
- Certificate Authority (CA)
-
A trusted entity that issues digital certificates by verifying the identity of certificate requesters and digitally signing the certificates.
- Certificate Discovery
-
The automated process of finding and inventorying existing certificates across an organization’s infrastructure.
- Certificate Lifecycle
-
The complete process from certificate request through expiration, including issuance, distribution, usage, renewal, and revocation.
- Certificate Policy
-
A set of rules and parameters that define how certificates are issued, what information they contain, and how they should be managed.
- Certificate Repository
-
A centralized storage system that stores and distributes certificates and certificate revocation information.
- Certificate Revocation List (CRL)
-
A periodically published list of certificates that have been revoked before their expiration date.
- Certificate Signing Request (CSR)
-
A message sent to a Certificate Authority containing a public key and identifying information for certificate issuance.
- Client Certificate
-
A digital certificate that functions like a digital ID card for users and devices, providing authentication and secure access to systems.
- Code Signing Certificate
-
A digital certificate used by software developers to digitally sign applications, proving the software’s authenticity and integrity.
- Compliance
-
Adherence to regulatory requirements, security standards, and organizational policies governing certificate management practices.
- Cross-Certification
-
A trust relationship established between separate PKI hierarchies, allowing certificates from one hierarchy to be trusted in another.
- Cryptographic Algorithm
-
Mathematical procedures used for encryption, decryption, digital signing, and key generation in certificate operations.
D
- Device Certificate
-
Specialized certificates installed on IoT devices and other hardware to enable secure machine-to-machine communication.
- Digital Signature
-
A cryptographic mechanism that provides authentication, non-repudiation, and data integrity for digital documents and certificates.
- Domain Validated (DV) Certificate
-
A basic TLS certificate that confirms domain ownership through simple verification processes.
E
- End Entity
-
The subject of a certificate - an individual, device, or service that uses certificates for secure operations.
- End Entity Password
-
Authentication credentials that enable end entities to request certificates through self-service operations.
- EST (Enrollment over Secure Transport)
-
A standardized protocol (RFC 7030) for automated certificate enrollment and management over HTTPS.
- Extended Validation (EV) Certificate
-
The highest level of TLS certificate validation, requiring rigorous verification of organization details and providing strong visual trust indicators.
H
- Hardware Security Module (HSM)
-
A dedicated cryptographic device that provides secure key storage and cryptographic operations for protecting Certificate Authority private keys.
- Hierarchical Trust
-
A PKI trust model organized with a single Root CA at the top, with trust flowing downward through Intermediate CAs.
I
- Intermediate CA
-
A Certificate Authority that operates under a Root CA in a hierarchical PKI structure, typically used to issue end entity certificates.
K
- Key Protection
-
Security measures and technologies used to safeguard cryptographic private keys from unauthorized access or compromise.
M
- Multi-Domain Certificate
-
A certificate that secures multiple unrelated domains using Subject Alternative Names (SAN), also known as a SAN certificate.
O
- OCSP (Online Certificate Status Protocol)
-
A protocol that provides real-time certificate validation by checking revocation status with the issuing CA.
- OCSP Stapling
-
A mechanism that allows servers to include OCSP responses with their certificates, improving performance and privacy.
- Organization Validated (OV) Certificate
-
A TLS certificate that includes verification of the organization’s identity in addition to domain ownership.
P
- PKI (Public Key Infrastructure)
-
A framework of technologies, policies, and procedures that enables secure communication through digital certificates and cryptographic keys.
- PKCS (Public Key Cryptography Standards)
-
A set of standards for cryptographic operations, including certificate requests (PKCS#10) and key storage (PKCS#12).
- Policy Enforcement
-
The automatic application of certificate policies to ensure all issued certificates meet organizational and regulatory requirements.
- Progressive Disclosure
-
A documentation strategy that presents information in layers, allowing users to access increasingly detailed information as needed.
R
- RA Operator
-
A user role that manages certificates within assigned realms, typically handling day-to-day certificate operations.
- Realm
-
A logical container that provides separation between different certificate environments, each with its own policies, end entities, and certificates.
- Registration Authority (RA)
-
An entity that handles the verification of certificate requests before they reach the Certificate Authority.
- Role-Based Access Control (RBAC)
-
A security model that assigns permissions based on user roles and job functions within the organization.
- Root CA
-
The top-level Certificate Authority in a PKI hierarchy, whose certificate is self-signed and serves as the trust anchor.
S
- S/MIME Certificate
-
A certificate used for encrypting, decrypting, and digitally signing email messages according to the S/MIME standard.
- Self-Service Certificate Management
-
The capability for end entities to request, renew, and manage their own certificates without administrator intervention.
- Single Domain Certificate
-
A TLS certificate that secures one specific domain name.
T
- TLS Certificate
-
A digital credential that enables encrypted connections between servers and clients, commonly used to secure websites with HTTPS.
- Trust Model
-
The framework that defines how trust relationships are established and maintained within a PKI system.
W
- Web of Trust
-
A decentralized trust model where individuals vouch for the authenticity of others' keys through a network of relationships.
- Wildcard Certificate
-
A TLS certificate that covers a main domain and all its first-level subdomains using a wildcard notation (*.example.com).