DiscreteSignatureAlgorithm - Yes or No?


this setting pki, enables support pkcs #1 v2.1 signature format certificate requests.  suggest property additive , in no way affects other signature algorithms. understanding allow increasing number of algorithms (hash , signature) in cryptography next generation (cng). 

1.  current or upcoming technologies used for?  implement pki , wondering why should or should not use it. 

2.  additive only.  in other words, of machines either windows or linux- want make sure not limit or make certificate incompatible hosts or applications.

in essence, looking why (or why not) should enable feature go beyond acronyms pkcs (or cng) mean little me.

i recommend not using alternate signature algorithm if deploying rsa signature sha# variant. use if deploying elliptical curve or other advanced algorithms.

there many clients not support pkcs#1 v2.1 signature (windows xp, windows server 2003) , phrase not support means not @ (cannot trust root certificate, never mind enroll certificates).

brian



Windows Server  >  Security



Comments

Popular posts from this blog

server manager error: ADAM.events.xml could not be enumerated.

Cannot access Anywhere Access using domain name?

WMI Failure: Unable to update Local Resource Group