(See section 8.2 Check the Security Model.) This specification provides a normative XML Schema .The full normative grammar is defined by the XSD schema and the normative text in this specification.The signature is safely saved as a part of the signed PDF document, that cannot be modified unless making the signature “not valid”.
More specifically, this specification defines an XML signature element type and an XML signature application; conformance requirements for each are specified by way of schema definitions and prose respectively.
This specification also includes other useful types that identify methods for referencing collections of resources, algorithms, and keying and management information.
The XML Signature is a method of associating a key with referenced data (octets); it does not normatively specify how keys are associated with persons or institutions, nor the meaning of the data being referenced and signed.
Consequently, while this specification is an important component of secure XML applications, it itself is not sufficient to address all application security/trust concerns, particularly with respect to using signed XML (or other data formats) as a basis of human-to-human communication and agreement. The Working Group encourages implementers and developers to read For readability, brevity, and historic reasons this document uses the term "signature" to generally refer to digital authentication values of all types.
These key words are not used (capitalized) to describe XML grammar; schema definitions unambiguously describe such requirements and we wish to reserve the prominence of these terms for the natural language descriptions of protocols and features.
For instance, an XML attribute might be described as being "optional." Compliance with the Namespaces in XML specification [." This document specifies optional and mandatory to support algorithms, providing references for these algorithms.
The certificate to be used is PKCS#12 certificate (extension “.pfx”): this type of certificate is encrypted with a private and a public key according to recognised standard that makes it safe and compliant with a wide range of regulation requirements.
The digital signature cannot be altered, and it represents a strong proof of user identity.
The standalone XSD schema file is authoritative in case there is any disagreement between it and the XSD schema portions in this specification.