IT:Network:Applications.  Single Key (Symmetric) encryption ◦ One “key” or passphrase used to encrypt and decrypt ◦ FAST – good for large amounts of.

Slides:



Advertisements
Similar presentations
Introduction of Grid Security
Advertisements

SSL Implementation Guide Onno W. Purbo
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Grid Computing Basics From the perspective of security or An Introduction to Certificates.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
DNS and HTTPs ACN Presentation. Domain Names We refer to computers on the Internet (Internet hosts), by names like: sharda.ac.in These are called domain.
Chapter 9 Deploying IIS and Active Directory Certificate Services
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter 10 Securing Exchange Server 2003.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
SIS: Secure Information Sharing for Windows Systems Osama Khaleel CS526 Semester Project.
Intel Confidential 1 Configure PKI Web Server Certificates for each Management Controller.
Online Security Tuesday April 8, 2003 Maxence Crossley.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC)
Signing and Encrypting With the Thawte Web of Trust CSU Professional Development Institute January 8, 2009 Steve Lovaas.
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Topic 11: Key Distribution and Agreement 1 Information Security CS 526 Topic 11: Key Distribution & Agreement, Secure Communication.
03 December 2003 Public Key Infrastructure and Authentication Mark Norman DCOCE Oxford University Computing Services.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
TLS/SSL Review. Transport Layer Security A 30-second history Secure Sockets Layer was developed by Netscape in 1994 as a protocol which permitted persistent.
Computer Science Public Key Management Lecture 5.
Configuring Active Directory Certificate Services Lesson 13.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Apache Security with SSL Using FreeBSD SANOG VI IP Services Workshop July 18, 2005 Hervey Allen Network Startup Resource Center.
Secure Sockets Layer (SSL) Fred Schank Kevin Wetter.
Alpha Five User Group, Bill Parker, SSL Security and WAS, July 2007 SSL Security with Alpha Five App Server Protecting sensitive or personal data.
CSCI 6962: Server-side Design and Programming
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
Secure Electronic Transaction (SET)
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
Masud Hasan Secue VS Hushmail Project 2.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
1 Apache and Virtual Sites and SSL Dorcas Muthoni.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Configuring Directory Certificate Services Lesson 13.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Bridge Certification Architecture A Brief Demo by Tim Sigmon and Yuji Shinozaki June, 2000.
Module 9: Fundamentals of Securing Network Communication.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Using Encryption with Microsoft SQL Server 2000 Kevin McDonnell Technical Lead SQL Server Support Microsoft Corporation.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Encryption / Security Victor Norman IS333 / CS332 Spring 2014.
Windows 2000 Certificate Authority By Saunders Roesser.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Topic 14: Secure Communication1 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Creating and Managing Digital Certificates Chapter Eleven.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
Digital Signatures and Digital Certificates Monil Adhikari.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
Installing a SSL Server. Creating a key Before you can create a digital signature/certificate. You need first to create a private key. To do this process.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
EGI-InSPIRE RI Grid Training for Power Users EGI-InSPIRE N G I A E G I S Grid Training for Power Users Institute of Physics Belgrade.
X509 Web Authentication From the perspective of security or An Introduction to Certificates.
Trusted Organizations In the grid world one single CA usually covers a predefined geographic region or administrative domain: – Organization – Country.
Ondrej Sevecek | GOPAS a.s. MCSM:Directory Services | MVP:Enteprise Security | CISA | CEH | CHFI | Enterprise certification.
SSL Certificates for Secure Websites
A Programmer’s Guide to Secure Connections
Presentation transcript:

IT:Network:Applications

 Single Key (Symmetric) encryption ◦ One “key” or passphrase used to encrypt and decrypt ◦ FAST – good for large amounts of data ◦ How do you get the key across the network? ◦ Ex: AES, DES, DES3  Dual key (or Asymmetric or public key) encryption ◦ Two mathematically related keys ◦ Public – used to encrypt / verify signature ◦ Private – used to decrypt / sign ◦ Slower functioning – not applicable for entire files ◦ Ex: RSA, DSA

 Server keeps private key  Gives out public key to anyone  Want to communicate- ◦ Get server’s public key ◦ Encrypt my data/request ◦ Send to server  Only server has private key – Only server can decrypt request!

 “Bad” server could claim to be web server for my bank ◦ “Here’s by public key, encrypt your account and send it to me”  How did you know to listen to me on 1 st day? ◦ NWTC said so – you trusted NWTC so you trusted me  NWTC is the authority we both trust

 Digital construct (X.509) that contains my public key and other info ◦ Subject: who owns this key ◦ Valid dates: start and expire ◦ Issuer of certificate ◦ etc  Issuer is someone we both trust ◦ Browser recognized issuer, accepts cert ◦ Browser doesn’t recognize issuer, rejects cert  Usually asks User what to do

 VeriSign, DigiCert, Thawte, GoDaddy etc ◦ Pay them and they give you cert ◦ Usually underwritten by big bank – TRUST ◦ Recognized by most browsers – good for outside  Gen your own ◦ e.g., Microsoft Certertificate Server (this is what we will do)  Microsoft CA (Certificate Authority) ◦ e.g., OpenSSL – comes with Linux

 Issues certificates for you – Acts as Certificate Authority (CA)  Can implement a CA hierarchy ◦ Root server is at top – issues certs for other CA’s ◦ Subordinate CA  Gets cert from “higher” CA – sort of like introducing it  Issues certs for “lower” CA’s & end servers  Can be Enterprise or Standalone ◦ Enterprise requires a Domain Controller/Active Directory (Domain Member?)  Can automate issuing of some certs ◦ Stand-alone can be on any Microsoft Server  Must do “issuing” yourself

 Installation ◦ Add/Remove Windows Components-2003 ◦ Add Role-2008  Certificate Services  mmc – Add “Certificate Authority” ◦ Certificate Templates – used to build rules for auto- issuing of certs by Enterprise CA ◦ Certificates – used to control certs issued to this entity (user, server,…)

 Properties of specific Web Site > Directory Security > Server Certificate button  Create new certificate  Prepare but send later ◦ as opposed to asking Enterprise CA  Give name (this can be anything) ◦ Org and Org Unit  Don’t confuse with LDAP Naming  Common Name – Must be fully qualified domain name of web site (acct.abccompany.local) ◦ State and City  C:\certreq.txt

 Right click on Server name ◦ All Tasks ◦ Submit New Request  Read file (certreq.txt)  Shows up in Pending Requests ◦ REAL CA would look at request, and verify it’s correct – valid machine, paid bill, …  Right click on the specific pending request ◦ All Tasks ◦ Issue  Moves to Issued Certificates ◦ Right click and Export Binary Data to a file ◦ IIS Manager expects file with.cer extension

 Directory Security > Server Certificate button ◦ Process Pending Request and Install…  SSL port 443  After completing install (click OK to close props), SSL enabled 