How Certificates Are Used
457
These are the authentication steps shown in
Figure B.5, “Using a Certificate to Authenticate a Client to
a Server”
:
1. The client software maintains a database of the private keys that correspond to the public
keys published in any certificates issued for that client. The client asks for the password to this
database the first time the client needs to access it during a given session, such as the first
time the user attempts to access an SSL-enabled server that requires certificate-based client
authentication.
After entering this password once, the user does not need to enter it again for the rest of the
session, even when accessing other SSL-enabled servers.
2. The client unlocks the private-key database, retrieves the private key for the user's certificate,
and uses that private key to sign data randomly-generated from input from both the client and the
server. This data and the digital signature are evidence of the private key's validity. The digital
signature can be created only with that private key and can be validated with the corresponding
public key against the signed data, which is unique to the SSL session.
3. The client sends both the user's certificate and the randomly-generated data across the network.
4. The server uses the certificate and the signed data to authenticate the user's identity.
5. The server may perform other authentication tasks, such as checking that the certificate presented
by the client is stored in the user's entry in an LDAP directory. The server then evaluates whether
the identified user is permitted to access the requested resource. This evaluation process can
employ a variety of standard authorization mechanisms, potentially using additional information
in an LDAP directory or company databases. If the result of the evaluation is positive, the server
allows the client to access the requested resource.
Certificates replace the authentication portion of the interaction between the client and the server.
Instead of requiring a user to send passwords across the network continually, single sign-on requires
the user to enter the private-key database password once, without sending it across the network. For
the rest of the session, the client presents the user's certificate to authenticate the user to each new
server it encounters. Existing authorization mechanisms based on the authenticated user identity are
not affected.
B.4.3. How Certificates Are Used
The following sections cover common certificate types and when these certificates are commonly
used.
•
Section B.4.3.1, “Types of Certificates”
•
Section B.4.3.2, “SSL”
•
Section B.4.3.3, “Signed and Encrypted Email”
•
Section B.4.4, “Single Sign-on”
B.4.3.1. Types of Certificates
Five kinds of certificates are commonly used:
Содержание CERTIFICATE SYSTEM 7.2 - MIGRATION GUIDE
Страница 36: ...Chapter 1 Overview 16 Figure 1 4 Certificate System Architecture ...
Страница 144: ...124 ...
Страница 160: ...140 ...
Страница 208: ...188 ...
Страница 210: ...190 ...
Страница 256: ...236 ...
Страница 282: ...Chapter 12 Certificate Profiles 262 Parameter IssuerName_n IssuerType_n ...
Страница 285: ...Freshest CRL Extension Default 265 Parameter PointName_n PointIssuerName_n ...
Страница 335: ...Configuring Mappers 315 Figure 14 9 Selecting a New Mapper Type 6 Edit the mapper instance and click OK ...
Страница 362: ...342 ...
Страница 376: ...356 ...
Страница 436: ...416 ...
Страница 490: ...470 ...
Страница 504: ...484 ...