564
edits
(→Notes) |
|||
| Line 111: | Line 111: | ||
*Each origin will only have access to the asymmetric private key generated for it. This will minimize the need for any kind of access control dialog for key usage. | *Each origin will only have access to the asymmetric private key generated for it. This will minimize the need for any kind of access control dialog for key usage. | ||
== References == | == References == | ||
edits