
Certificates and Authentication
Appendix J
Introduction to Public-Key Cryptography
777
Figure J-4
Using a Password to Authenticate a Client to a Server
These are the steps shown in Figure J-4:
1.
In response to an authentication request from the server, the client displays a dialog box
requesting the user’s name and password for that server. The user must supply a name
and password separately for each new server the user wishes to use during a work
session.
2.
The client sends the name and password across the network, either in the clear or over
an encrypted SSL connection.
3.
The server looks up the name and password in its local password database and, if they
match, accepts them as evidence authenticating the user’s identity.
4.
The server determines whether the identified user is permitted to access the requested
resource, and if so allows the client to access it.
With this arrangement, the user must supply a new password for each server, and the
administrator must keep track of the name and password for each user, typically on separate
servers.
As shown in the next section, one of the advantages of certificate-based authentication is
that it can be used to replace the first three steps in Figure J-4 with a mechanism that allows
the user to supply just one password (which is not sent across the network) and allows the
administrator to control user authentication centrally.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...