EASMC Day 2
Across
- 1. The file containing the CA Server name and port
- 3. Master users do not have one of these
- 6. The First Officer is this role
- 7. The file containing information SMA requires
- 8. commands used to manage the directory from Command shell
- 11. how we free up space in the CA Database
- 12. key used to encrypt documents
- 16. Only state an account can be deleted from
- 17. Forces the CA private key usage to 100%
- 20. how we reissue keys to a user
- 21. key used to sign documents
- 22. what we do when we dont trust a certificate
Down
- 2. State of user without account in PKI Database
- 4. password.rules sets my password rules
- 5. One of the activation codes
- 9. location in directory
- 10. when keys update automatically
- 13. unique value in certificate used for revocation
- 14. This account is created during the PKI initialization
- 15. what we do to an account that is temporarily inactive
- 18. how we republish data to the directory from the CA
- 19. list of untrusted CAs