Digital Certificates and Secure Web Access

1,160 views

Published on

Visit http://makemoneyonlineformulas.info/form.php?id=56198 for more info

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,160
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Digital Certificates and Secure Web Access

  1. 1. Digital Certificates and Secure Web Access
  2. 2. Introduction
  3. 3. This article describes the use of Digital Certificates as amechanism for strongly authenticating users to web siteswhere identity information is required. Before the advent of digital certificates the only option for authenticating users to a site was to assign a username and password. Digital certificates on the other hand provide for muchmore robust access control and have a number of benefits over username and password.
  4. 4. Username and password authentication
  5. 5. Using username and password the process is generally as follows: each time a user wishes to access a web servicethe user navigates to the site and authenticate themselves to the application using unique username and password. This data is passed to the server (hopefully in an encrypted form), the application looks up the usernameand the password (or a representation of the password) in some form of access control list and provided the information matches the user is granted access.
  6. 6. This method has some obvious limitations:
  7. 7. * The username and password are passed over the web (encrypted or unencrypted) with the typical security concerns of interception.
  8. 8. * The systems administrator normally has unrestrictedaccess to all usernames and passwords with associated security and liability concerns for the service provider (especially with confidential data)
  9. 9. * The user needs to remember as many usernames andpasswords as are required by their applications leading to inevitable support issues to recover lost access data
  10. 10. Digital Certificate Authentication
  11. 11. The typical digital certificate web access process is:
  12. 12. The user navigates to the website. Before allowing access it checks the certificate against the access database. Theuser enters the password locally to confirming their access right to the certificate and is allowed to the website.
  13. 13. Benefits of certificates over username and password:
  14. 14. * General security is enhanced: the user needs both thecertificate itself and the password to the certificate to gain access.
  15. 15. * The password is never passed over the web, not even during account set-up.
  16. 16. * At no stage do systems administrators have access to user passwords.
  17. 17. * The certificate can electronically sign data on the website with the benefit of non-repudiation.
  18. 18. * The user uses one digital identity with one password to access a range of applications (reduces passwords to remember).
  19. 19. Implementing Digital Certificates
  20. 20. All major web servers support client authentication via certificates. An SSL certificate on the web server (to support https) enables configuration of client authentication and only requires specification of the access rights for each directory served by the web server. Amend the web application to support client authentication by certificates. If any code was developed to handle user name and password, then the certificatecredentials can be looked up in an access control list in just the same way. Client certificates are issued via a Public Key Infrastructure (PKI) You can choose implement your own or use the services of a Managed Service Provider such as Diginus Ltd.
  21. 21. Wider Use
  22. 22. Once customers or employees have digital certificates, the same certificates can be used to digitally sign email, PDF and web forms and Microsoft Word documents. With a few small steps a corporate website can be transformedinto the centre of a powerful web services infrastructure, with single sign on to multiple web applications, signed email and forms data exchange, all the time knowing exactly who is accessing the resources and data.
  23. 23. Please visit:http://makemoneyonlineformulas.info/form.php?id=5619 8 for more info

×