Download presentation
Presentation is loading. Please wait.
Published byJeffry Wilcox Modified over 9 years ago
1
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District
2
WHAT ARE WE HERE for?
3
WHAT’S A Digital Certificate? A (digital) form of identification –Drivers License –Passport Provides “information” about identity –Contains the public key of the entity identified in the certificate –The public key is matched to an identity and guaranteed by the issuer (Certificate Authority)
4
Certificate Uses Personal –Used to identify/validate individuals Server –Used to verify its identity to users –Bases for encryption Software Publisher –Used to sign/verify software Authority –Used to verify “signed” certificates
5
Certificate “Flavors” Public –Public signed certificate leveraging the PKI (Public Key Infrastructure) Private –Self generated/signed Wild Card –Used to represent a domain rather then a site Secure –40 to 256 bit encryption Secure Pro –128 to 256 bit encryption Extended Validation (EV) –Triggers the green address bar
6
Makeup of a Certificate Version number: X.509 standard Serial number –Uniquely identifies the certificate Certificate algorithm identifier –Key algorithm used to sign the certificate Issuer Validity period –The start (Valid from) and expiration date (Valid to) Subject –Name of the owner
7
Makeup of a Certificate Subject public key information –The owners public key and its algorithms Issuer unique identifier Subject unique identifier –Unique identifier of the certificate owner Extensions –Additional information related to the use and handling Certification authority's digital signature –Digital signature made with the certification authority's private key
8
Certificate Verification Certification Authority’s Name Your Identification Information Your Public Key Value Certification Authority’s Digital Signature Certificate Authority’s Public Key Message Digest
9
Certificate Verification
10
WHERE to GET CERTIFICATES www.verisign.com www.godaddy.com www.thwart.com Generate your own
11
How to Get Certificates Generate a request from the server Send the request to the certificate authority (CA) The certificate authority (CA) verifies your identity The certificate authority (CA) signs the certificate and returns it You install the certificate on your server
12
COMMON ERRORS Outside valid dates Site name does not match –Custom URL –Redirect Cannot be validated against the CA Common with self signed certificates Key does not match
13
SSL/TLS Secure Socket Layer – SSL Transport Layer Security – TLS Really what we are talking about is encryption that provides cryptographic security over network infrastructure like the Internet Encrypts the end-to-end segments of the connections at the Transport Layer (UDP/TCP) Commonly used to secure application protocols like HTTP, SMTP, ETC
14
SSL/TLS Link Network Transport Application Telnet, FTP, SMTP, HTTP TCP UDP IP, ICMP, IGMP Network interface and device driver TLS/SSL ENCAPSULATION
15
SSL/TLS
16
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.