Lines Matching full:identity

29   <li class="inline"><a href="#scfg">Configuration - Identity Schemes</a></li>
30 <li class="inline"><a href="#ident">Identity Schemes and Cryptotypes</a></li>
38identity schemes described on the <a href="http://www.eecis.udel.edu/~mills/ident.html">Autokey Id…
61 …e trails one or another identity schemes described on the <a href="http://www.eecis.udel.edu/~mill…
62 …hierarchies. The identity scheme insures that the server is authentic and not victim of masquerade…
63identity exchange with the TAs of parent subnets All group hosts construct an unbroken certific…
67 <p>The identity exchange is run between a TA acting as a server and a TH acting as a client. As sho…
68 …up key is not divulged to the clients, so they cannot conspire to prove identity to other hosts.</…
69 …/ident.html">Autokey Identity Schemes</a> page, there are five identity schemes, three of which - …
80 …nd between X and S. Therefore, both parent subnet TAs C and S run an identity exchange with chi…
93 <h4 id="scfg">Configuration - Identity Schemes</h4>
94identity scheme, but others, including GQ and MV, can be used as well. It's best to start with a …
104 <h4 id="ident">Identity Schemes and Cryptotypes</h4>
105 <p>A specific combination of authentication and identity schemes is called a <em>cryptotype</em>, w…
116 …> configuration command and compatible host key, public certificate and identity scheme files are …
174 …re necessary. Some errors are due to mismatched keys, digest schemes or identity schemes and must …
187 <dt>106 unsupported identity type</dt>
188 <dd>The client or server has requested an identity scheme the other does not support.</dd>
204 <dd>The identity key is missing, corrupt or bogus.</dd>