Appendix B. Introduction to Public-Key Cryptography
456
not sent across the network, and allows the administrator to control user authentication centrally. This
is called
single sign-on
.
Figure B.5, “Using a Certificate to Authenticate a Client to a Server”
shows how client authentication
works using certificates and SSL. To authenticate a user to a server, a client digitally signs a randomly
generated piece of data and sends both the certificate and the signed data across the network. The
server authenticates the user's identity based on the data in the certificate and signed data.
Like
Figure B.4, “Using a Password to Authenticate a Client to a Server”
,
Figure B.5, “Using a
Certificate to Authenticate a Client to a Server”
assumes that the user has already trusted the server
and requested a resource and that the server has requested client authentication before granting
access to the requested resource.
Figure B.5. Using a Certificate to Authenticate a Client to a Server
Unlike the authentication process in
Figure B.4, “Using a Password to Authenticate a Client to a
Server”
, the authentication process in
Figure B.5, “Using a Certificate to Authenticate a Client to
a Server”
requires SSL.
Figure B.5, “Using a Certificate to Authenticate a Client to a Server”
also
assumes that the client has a valid certificate that can be used to identify the client to the server.
Certificate-based authentication is preferred to password-based authentication because it is based on
the user both possessing the private key and knowing the password. However, these two assumptions
are true only if unauthorized personnel have not gained access to the user's machine or password,
the password for the client software's private key database has been set, and the software is set up to
request the password at reasonably frequent intervals.
NOTE
Neither password-based authentication nor certificate-based authentication address
security issues related to physical access to individual machines or passwords. Public-
key cryptography can only verify that a private key used to sign some data corresponds to
the public key in a certificate. It is the user's responsibility to protect a machine's physical
security and to keep the private-key password secret.
Содержание CERTIFICATE SYSTEM 7.2 - MIGRATION GUIDE
Страница 36: ...Chapter 1 Overview 16 Figure 1 4 Certificate System Architecture ...
Страница 144: ...124 ...
Страница 160: ...140 ...
Страница 208: ...188 ...
Страница 210: ...190 ...
Страница 256: ...236 ...
Страница 282: ...Chapter 12 Certificate Profiles 262 Parameter IssuerName_n IssuerType_n ...
Страница 285: ...Freshest CRL Extension Default 265 Parameter PointName_n PointIssuerName_n ...
Страница 335: ...Configuring Mappers 315 Figure 14 9 Selecting a New Mapper Type 6 Edit the mapper instance and click OK ...
Страница 362: ...342 ...
Страница 376: ...356 ...
Страница 436: ...416 ...
Страница 490: ...470 ...
Страница 504: ...484 ...