279:
177:
63:
22:
198:
191:
35:
347:
241:
139:
87:
of the topic and provide significant coverage of it beyond a mere trivial mention. If notability cannot be shown, the article is likely to be
319:
213:
111:
675:
326:
220:
118:
333:
289:
227:
125:
644:, can be seen as a profile of CMC for use in provisioning certificates to end entities. As such, EST can play a similar role to
663:
645:
315:
209:
107:
41:
691:
373:
260:
158:
49:
696:
669:
633:
530:
657:
607:
304:
481:
340:
234:
132:
84:
584:
706:
701:
300:
296:
80:
615:
96:
621:
CMS is one of two protocols utilizing the
Certificate Request Message Format (CRMF), described in
187:
611:
73:
8:
92:
576:
88:
637:
622:
596:
588:
641:
626:
600:
592:
685:
523:
435:
516:
278:
176:
511:
79:
Please help to demonstrate the notability of the topic by citing
456:
580:
498:
494:
463:
449:
534:
529:
522:
515:
510:
505:
492:
480:
468:
461:
454:
447:
440:
430:
683:
487:
475:
676:Automated Certificate Management Environment
305:introducing citations to additional sources
424:
388:
50:Learn how and when to remove these messages
610:(CMP), it can be used for obtaining X.509
374:Learn how and when to remove this message
261:Learn how and when to remove this message
159:Learn how and when to remove this message
583:, defining transport mechanisms for the
423:
295:Relevant discussion may be found on the
684:
664:Simple Certificate Enrollment Protocol
389:CMC (Certificate Management over CMS)
197:Please improve this article by adding
629:, with the other protocol being CMP.
272:
170:
56:
15:
13:
14:
718:
316:"Certificate Management over CMS"
210:"Certificate Management over CMS"
108:"Certificate Management over CMS"
31:This article has multiple issues.
670:Enrollment over Secure Transport
634:Enrollment over Secure Transport
288:relies largely or entirely on a
277:
175:
61:
20:
658:Certificate Management Protocol
608:Certificate Management Protocol
573:Certificate Management over CMS
39:or discuss these issues on the
595:, its transport mechanisms in
385:
1:
636:(EST) protocol, described in
199:secondary or tertiary sources
585:Cryptographic Message Syntax
74:general notability guideline
7:
651:
405:field of application :
10:
723:
561:
556:
548:
543:
418:
413:
408:
403:
398:
393:
81:reliable secondary sources
70:The topic of this article
692:Public key infrastructure
616:public key infrastructure
587:(CMS). It is defined in
426:CMC in the TCP/IP model:
72:may not meet Knowledge's
697:Cryptographic protocols
409:certificate management
186:relies excessively on
612:digital certificates
301:improve this article
427:
707:Internet protocols
702:Internet Standards
558:obsolete standard:
545:proposed standard:
425:
76:
606:Similarly to the
579:published by the
577:Internet Standard
569:
568:
539:
538:
384:
383:
376:
366:
365:
351:
271:
270:
263:
245:
169:
168:
161:
143:
71:
54:
714:
428:
386:
379:
372:
361:
358:
352:
350:
309:
281:
273:
266:
259:
255:
252:
246:
244:
203:
179:
171:
164:
157:
153:
150:
144:
142:
101:
65:
64:
57:
46:
24:
23:
16:
722:
721:
717:
716:
715:
713:
712:
711:
682:
681:
654:
564:
551:
525:
518:
415:newest version:
380:
369:
368:
367:
362:
356:
353:
310:
308:
294:
282:
267:
256:
250:
247:
204:
202:
196:
192:primary sources
180:
165:
154:
148:
145:
102:
100:
78:
66:
62:
25:
21:
12:
11:
5:
720:
710:
709:
704:
699:
694:
680:
679:
673:
667:
661:
653:
650:
567:
566:
560:
554:
553:
547:
541:
540:
537:
536:
533:
528:
521:
514:
509:
503:
502:
491:
485:
484:
479:
473:
472:
467:
460:
453:
445:
444:
439:
434:
421:
420:
417:
411:
410:
407:
401:
400:
397:
391:
390:
382:
381:
364:
363:
299:. Please help
285:
283:
276:
269:
268:
183:
181:
174:
167:
166:
69:
67:
60:
55:
29:
28:
26:
19:
9:
6:
4:
3:
2:
719:
708:
705:
703:
700:
698:
695:
693:
690:
689:
687:
677:
674:
671:
668:
665:
662:
659:
656:
655:
649:
647:
643:
639:
635:
630:
628:
624:
619:
617:
613:
609:
604:
602:
598:
594:
590:
586:
582:
578:
574:
565:
559:
555:
552:
546:
542:
532:
527:
520:
513:
508:
504:
500:
496:
490:
486:
483:
478:
474:
471:
466:
465:
459:
458:
452:
451:
446:
443:
438:
433:
429:
422:
416:
412:
406:
402:
396:
392:
387:
378:
375:
360:
357:November 2017
349:
346:
342:
339:
335:
332:
328:
325:
321:
318: –
317:
313:
312:Find sources:
306:
302:
298:
292:
291:
290:single source
286:This article
284:
280:
275:
274:
265:
262:
254:
251:November 2017
243:
240:
236:
233:
229:
226:
222:
219:
215:
212: –
211:
207:
206:Find sources:
200:
194:
193:
189:
184:This article
182:
178:
173:
172:
163:
160:
152:
149:November 2017
141:
138:
134:
131:
127:
124:
120:
117:
113:
110: –
109:
105:
104:Find sources:
98:
94:
90:
86:
82:
75:
68:
59:
58:
53:
51:
44:
43:
38:
37:
32:
27:
18:
17:
631:
620:
605:
575:(CMC) is an
572:
570:
562:
557:
549:
544:
506:
488:
476:
469:
462:
455:
448:
441:
436:
431:
414:
404:
394:
370:
354:
344:
337:
330:
323:
311:
287:
257:
248:
238:
231:
224:
217:
205:
185:
155:
146:
136:
129:
122:
115:
103:
47:
40:
34:
33:Please help
30:
432:application
85:independent
686:Categories
327:newspapers
221:newspapers
188:references
119:newspapers
93:redirected
36:improve it
477:transport
419:RFC 5272
297:talk page
83:that are
42:talk page
652:See also
563:RFC 2797
550:RFC 5272
512:Ethernet
489:Internet
399:unknown
618:(PKI).
395:family:
341:scholar
235:scholar
133:scholar
97:deleted
678:(ACME)
666:(SCEP)
640:
625:
599:
591:
343:
336:
329:
322:
314:
237:
230:
223:
216:
208:
135:
128:
121:
114:
106:
89:merged
672:(EST)
660:(CMP)
614:in a
524:Token
517:Token
457:HTTPS
348:JSTOR
334:books
242:JSTOR
228:books
140:JSTOR
126:books
95:, or
646:SCEP
642:7030
632:The
627:4211
601:5273
593:5272
581:IETF
571:The
535:...
531:FDDI
526:Ring
507:link
499:IPv6
495:IPv4
493:IP (
464:SMTP
450:HTTP
320:news
214:news
112:news
638:RFC
623:RFC
597:RFC
589:RFC
519:Bus
482:TCP
470:...
442:CMC
437:CMC
303:by
190:to
688::
648:.
603:.
501:)
497:,
201:.
91:,
45:.
377:)
371:(
359:)
355:(
345:·
338:·
331:·
324:·
307:.
293:.
264:)
258:(
253:)
249:(
239:·
232:·
225:·
218:·
195:.
162:)
156:(
151:)
147:(
137:·
130:·
123:·
116:·
99:.
77:.
52:)
48:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.