
The SSL Handshake
Appendix K
Introduction to SSL
811
Figure K-3
Authentication and Verification of a Client Certificate
An SSL-enabled server goes through these steps to authenticate a user’s identity:
1.
Does the user’s public key validate the user’s digital signature?
The server checks
that the user’s digital signature can be validated with the public key in the certificate. If
so, the server has established that the public key asserted to belong to John Doe
matches the private key used to create the signature and that the data has not been
tampered with since it was signed.
At this point, however, the binding between the public key and the DN specified in the
certificate has not yet been established. The certificate might have been created by
someone attempting to impersonate the user. To validate the binding between the
public key and the DN, the server must also complete Step 3 and Step 4.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...