Hi Ivan,Thanks for the note. Is there a particular document where a definition is made and you would like to see clarification? Thanks,
There is a Power Point presentation "CSA Key Managment WG", which has section "Scope" and it move out following
Out of Scope: Not to make Identity and Access Management (IAM) specifications, and does not intend to supplant IAM adoption or best-practices.And I'm thinking in general, it's good to have a Scope definition and include PKI as part of this scope, since I don't think that Asymmetric keys are considered to be used by their own and if we are adding some additional metadata to the public key we have certificate. Also I wasn't able to find WG for PKI, there is a nice group under the NIST and their publication (NIST.SP.1800-16), so in my opinion we shouldn't take care much about PKI basics and approaches, but we should align WG proposals with those "Industry Standards"
Hi Ivan,Thanks for the note. Is there a particular document where a definition is made and you would like to see clarification?Thanks,