Managing authorization codes

Users of your application must identify themselves before:

  • Encrypting, decrypting, or signing data.

  • Communicating securely over a network.

A PKI, in turn, must be able to recognize users as trusted members of an organization. A user's credentials contain the information needed to authenticate the user to the PKI and to enable a user to perform cryptographic operations.

In an Entrust PKI, a user's credentials file, also called an Entrust profile, or user profile, is usually stored in a file with an .epf file name extension.