Lines Matching full:identity
29 <li class="inline"><a href="#scfg">Configuration - Identity Schemes</a></li>
30 <li class="inline"><a href="#ident">Identity Schemes and Cryptotypes</a></li>
38 …identity schemes described on the <a href="http://www.eecis.udel.edu/~mills/ident.html">Autokey Id…
61 …e trails one or another identity schemes described on the <a href="http://www.eecis.udel.edu/~mill…
62 …hierarchies. The identity scheme insures that the server is authentic and not victim of masquerade…
63 …identity exchange with the TAs of parent subnets All group hosts construct an unbroken certific…
67 <p>The identity exchange is run between a TA acting as a server and a TH acting as a client. As sho…
68 …up key is not divulged to the clients, so they cannot conspire to prove identity to other hosts.</…
69 …/ident.html">Autokey Identity Schemes</a> page, there are five identity schemes, three of which - …
80 …nd between X and S. Therefore, both parent subnet TAs C and S run an identity exchange with chi…
93 <h4 id="scfg">Configuration - Identity Schemes</h4>
94 …identity scheme, but others, including GQ and MV, can be used as well. It's best to start with a …
104 <h4 id="ident">Identity Schemes and Cryptotypes</h4>
105 <p>A specific combination of authentication and identity schemes is called a <em>cryptotype</em>, w…
116 …> configuration command and compatible host key, public certificate and identity scheme files are …
174 …re necessary. Some errors are due to mismatched keys, digest schemes or identity schemes and must …
187 <dt>106 unsupported identity type</dt>
188 <dd>The client or server has requested an identity scheme the other does not support.</dd>
204 <dd>The identity key is missing, corrupt or bogus.</dd>