As mentioned earlier in the overview chapter, authentication is very crucial to secure communications. You must know that the entity with whom you are communicating is, in fact, who it claims to be. The use of certificates is a common way of authenticating the person or entity with whom you want to communicate. This section will provide an overview of how certificates may be used for secure communications and how to use the Microsoft® CryptoAPI to manage and use those certificates.