Download presentation
Presentation is loading. Please wait.
Published byAnnabel Cain Modified over 8 years ago
1
The Trusted Network · · · LEFIS PKI · · · 2 nd June, 2006 · Sofia by Leonardo Catalinas · May 2006 lcg@unizar.es
2
Internet security today Simplest authentication methods and unprotected data traffic implies: ✗ Poor user's confidentiality ✗ Poorly verified user's identity ✗ Unverified data integrity
3
What we can do? well-authenticated access to resources Digital Signature private access which prevents non related people to spy member's actions
4
Tools Our own PKI ✔ Open Source Software ✔ Interoperability ✔ Cross CA ✔ Secure and identified web access ✔ Signed documents ✔ Signed e-mail Use of Public Key Technologies to increase security.
5
PKI Design Trust based in APTICE CA APTICE Certification Authority LEFIS Subordinated CA LEFIS Registration Authorities The LEFIS PKI APTICE CA LEFIS PKI ORG1 PKI ORG2 PKI signs delegates manages Lays Trust Base Used Lays Trust Base Trust Hierarchical Capable of recognize other PKIs Permits building multiple PKIs Cross Certification between PKIs PKI Design…
6
PKI Enrollment But, how to get a LEFIS Certificate? ✔ PDF Guide in english ✔ CSR Generation Adv. ✔ Easy Web Interface ✔ Local Keys Generation ✔ Platform independent LEFIS_MAN_EN_ ENROLL_LEFIS_PKI.pdf
7
LEFIS Web Site Aims Moodle Is a ‘CMS’ WG Activities Support User’s communication Dynamic contents Workshops Tasks Wiki Public Side (Informative) Private Side (for validated members)
8
LEFIS' Innovative idea Moodle + PKI = MoodlePKI ✔ An extension designed and developed by ourselves ✔ Makes Moodle able to identify users by their Certificates ✔ Certificates can be easily obtained in our PKI public web page ✔ We plan to recognize Certificates signed by other PKIs or CAs
9
Accessing The LEFIS Web Page With a Digital Certificate
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.