EASMC Day 2

12345678910111213141516171819202122
Across
  1. 1. The file containing the CA Server name and port
  2. 3. Master users do not have one of these
  3. 6. The First Officer is this role
  4. 7. The file containing information SMA requires
  5. 8. commands used to manage the directory from Command shell
  6. 11. how we free up space in the CA Database
  7. 12. key used to encrypt documents
  8. 16. Only state an account can be deleted from
  9. 17. Forces the CA private key usage to 100%
  10. 20. how we reissue keys to a user
  11. 21. key used to sign documents
  12. 22. what we do when we dont trust a certificate
Down
  1. 2. State of user without account in PKI Database
  2. 4. password.rules sets my password rules
  3. 5. One of the activation codes
  4. 9. location in directory
  5. 10. when keys update automatically
  6. 13. unique value in certificate used for revocation
  7. 14. This account is created during the PKI initialization
  8. 15. what we do to an account that is temporarily inactive
  9. 18. how we republish data to the directory from the CA
  10. 19. list of untrusted CAs