RP

(redirected from relying party)
Also found in: Dictionary, Medical, Encyclopedia, Wikipedia.
Mentioned in ?
References in periodicals archive ?
Because liability under the Directive is negligence-based (117), a certification-service-provider might be held to have no liability at all to a relying party.
The subscriber (probably a buyer) uses the private key to sign transactions, and a relying party (probably a seller) uses the certificate authority's directory of public keys and certificates to validate that the subscriber is a valid key holder and signer within the rules of this particular PKI.
Ping Identity Senior Technical Architect Pam Dingle serves on the board of directors of the OpenID Foundation and Ping Identity has plans to provide native OpenID relying party support for PingFederate in the second half of 2010.
5 also provides a Relying Party Component Set, which plugs into most common Web servers to add support for CardSpace and OpenID authentication requests.
The WSO2 IS features two primary components: the Identity Provider and Relying Party Component Set.
In related news, Ping Identity also announced today it will be contributing a generic Information Cards relying party C library to the open source community.
Additionally, the relying party can click on the signature box within the document and retrieve the certification status.
The SAML XASP profile enables relying party applications that have successfully authenticated the user with a digital certificate to go back to the organization that issued the digital certificate (the Identity Provider) and retrieve dynamic or sensitive user attributes that are not or should not be included with the certificate.
In addition, all participants were required to possess a FIPS 201-compliant identity credential, which were issued by XTec, and had to validate their identities by following the electronic authentication (eAuthentication) process of inserting respective smart identity credential and personal identification number (PIN) into relying party mobile handheld unit for identity verification.
These standards provide assurance that subscriber and relying party information is properly authenticated and restricted to authorized individuals; the continuity of key and certificate life cycle management operations is maintained; and the systems development, maintenance and operation of the certification authority are performed to maintain certification authority systems integrity.
Subscriber and relying party information is properly authenticated, restricted to authorized individuals, and protected from uses not related to the CA's business - The continuity of key and certificate life cycle management operations is maintained - CA systems development, maintenance, and operation are properly authorized and performed to maintain CA systems integrity
These standards assure that subscriber and relying party information is properly authenticated and restricted to authorized individuals; the continuity of key and certificate life cycle management operations is maintained; and, the systems development, maintenance and operation of the certification authority are performed to maintain certification authority systems integrity.