Authentication Methods
4-2
Hewlett-Packard Company Virtual Private Networking Concepts Guide
Certificate Authentication
Certificate Authentication
Certificate Authentication
Certificate Authentication
The first thing that two VPN devices do when they enter into a
communication is to exchange their certificates. Next, they
verify the authenticity of the certificates by ensuring that:
•
The identifying information and the digital signature are
separated.
•
A new MD5 digest of the identifying information is
generated.
•
The digital signature is decrypted.
The result is the MD5 digest (or summary) of the identifying
information that was generated by the certificate authority when
the certificate was created.
The new MD5 digest and the digest extracted from the digital
signature are then compared. If they are exactly the same, the
device is sure that the certificate is valid.
Note that the certificate authority is not involved in the
authentication process. Once the authentication process is
complete on both sides, the two devices can then begin the
session key exchange process or negotiation.
Related
Related
Related
Related
Information
Information
Information
Information
SecurID Authentication (page 4-4)
RADIUS Authentication (page 4-5)
Challenge Phrase Authentication (page 4-3)
Entrust Authentication (page 4-6)