SlideShare a Scribd company logo
1 of 3
Certificate authority
        In cryptography, a certificate authority or certification authority (CA) is an entity which issues digital certificates for use
        by other parties. It is an example of a trusted third party. CAs are characteristic of many public key infrastructure (PKI)
        schemes.

        There are many commercial CAs that charge for their services. Institutions and governments may have their own CAs, and
        there are free CAs.


        Issuing a certificate
        A CA will issue a public key certificate which states that the CA attests that the public key contained in the certificate
        belongs to the person, organization, server, or other entity noted in the certificate. A CA's obligation in such schemes is to
        verify an applicant's credentials, so that users (relying parties) can trust the information in the CA's certificates. The usual
        idea is that if the user trusts the CA and can verify the CA's signature, then they can also verify that a certain public key does
        indeed belong to whomever is identified in the certificate.


        List of certificate authorities
        Here is a list of some common certificate authorities (CA). For a CA to be of any use, the client must trust the CA. In case of
        a browser visiting a web site with a certificate, the CA for that certificate should ideally be known by the browser. If not, the
        user will be asked whether to trust the CA. Some of the CAs below claim to be known by 99% of all browsers.[1]

            •    VeriSign
            •    Thawte
            •    Entrust
            •    QuoVadis
            •    GoDaddy
            •    Cacert (free CA)
            •    EJBCA

                                 Scenario for Securing the Web Server using CA( Certification Authority)




Socket Address

The combination of the IP Address and Port Number is called as Socket Address.
Steps to Secure the IIS            using Certification Authority:

1.Create one web site in IIS
 Web Server                                        IP 100.0.0.2
                                                   M 255.0.0.0

2.Install the Certification Authority
  Certification Authority Server                   IP 100.0.0.1
                                                    M 255.0.0.0


3.Seuring the Web Server using ( Server Certificate )
  a. Obtain Web Server Certificate from Web Server
  Steps to obtain the Server Certificate :
  1.Go to Properties of the Web Server Web site
  2. Select the Directory Security -> Server Certificate -> Next -> Create a new Certificate
     ->Send the Request Immedate to the online Certification Authority -> Next ……….
  3.Go to Properties of the Web Server Web site -> Genral -> SSL Port 1234 -> OK



4.Try to access the web site at the client side. ( The Response is : The must be viewed over a secure Channel )


Steps to download the Client Certificate from the Certification Authority

Client can use the Certification Authority Web site to download the Client Certificate
Steps to download :
1. mmc -> console-> add/Remove snap-in -> add -> Certificates -> My user Account -> OK




SSL ( Secure Socket Layer )

pronounced as separate letters) Short for Secure Sockets Layer, a protocol developed by Netscape for transmitting private
documents via the Internet. SSL uses a cryptographic system that uses two keys to encrypt data − a public key known to
everyone and a private or secret key known only to the recipient of the message. Both Netscape Navigator and Internet
Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card
numbers.By convention, URLs that require an SSL connection start with https.

Meer Shahnawaz ( Abdullah )
Netmetric Solutions ,
# 101 ALI Manor , Masab Tank , Hyderabad.

More Related Content

What's hot

Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature pptRavi Ranjan
 
Digital signature
Digital signatureDigital signature
Digital signaturePraseela R
 
Digital certificates
Digital certificatesDigital certificates
Digital certificatesSimmi Kamra
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signaturejolly9293
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesIshwar Dayal
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTRajanGoyal16
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructurevimal kumar
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI InfrastructureShubham Sharma
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Nanda Mohan Shenoy
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATUREravijain90
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information securityDevam Shah
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 

What's hot (20)

Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATURE
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 

Similar to Certification authority

Offer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteOffer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteKeynectis
 
How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?Keynectis
 
Which are the best Organization Validation SSL Certificates?
Which are the best Organization Validation SSL Certificates? Which are the best Organization Validation SSL Certificates?
Which are the best Organization Validation SSL Certificates? AboutSSL
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication ModelsRaj Chanchal
 
Learn to Add an SSL Certificate Boost Your Site's Security.pdf
Learn to Add an SSL Certificate Boost Your Site's Security.pdfLearn to Add an SSL Certificate Boost Your Site's Security.pdf
Learn to Add an SSL Certificate Boost Your Site's Security.pdfReliqusConsulting
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfJUSTSTYLISH3B2MOHALI
 
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...Peter LaFond
 
O auth2 with angular js
O auth2 with angular jsO auth2 with angular js
O auth2 with angular jsBixlabs
 
The Global Fight for Internet Trust
The Global Fight for Internet TrustThe Global Fight for Internet Trust
The Global Fight for Internet TrustPECB
 
Web application security part 02
Web application security part 02Web application security part 02
Web application security part 02G Prachi
 
Dr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talkDr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talkpromediakw
 
Explain the role of the certificate authority and registration autho.pdf
Explain the role of the certificate authority and registration autho.pdfExplain the role of the certificate authority and registration autho.pdf
Explain the role of the certificate authority and registration autho.pdfashokarians
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commercemahesh tawade
 
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...Farooq Khan
 
InfoSecurity Europe 2015 - Identities Exposed by David Johansson
InfoSecurity Europe 2015 - Identities Exposed by David JohanssonInfoSecurity Europe 2015 - Identities Exposed by David Johansson
InfoSecurity Europe 2015 - Identities Exposed by David JohanssonDavid Johansson
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 

Similar to Certification authority (20)

CERTIFYING AUTHORITY
CERTIFYING AUTHORITYCERTIFYING AUTHORITY
CERTIFYING AUTHORITY
 
Offer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteOffer a trustworthy environment on your web site
Offer a trustworthy environment on your web site
 
How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?
 
Which are the best Organization Validation SSL Certificates?
Which are the best Organization Validation SSL Certificates? Which are the best Organization Validation SSL Certificates?
Which are the best Organization Validation SSL Certificates?
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication Models
 
Ssl Https Server
Ssl Https ServerSsl Https Server
Ssl Https Server
 
Learn to Add an SSL Certificate Boost Your Site's Security.pdf
Learn to Add an SSL Certificate Boost Your Site's Security.pdfLearn to Add an SSL Certificate Boost Your Site's Security.pdf
Learn to Add an SSL Certificate Boost Your Site's Security.pdf
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
 
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
 
O auth2 with angular js
O auth2 with angular jsO auth2 with angular js
O auth2 with angular js
 
The Global Fight for Internet Trust
The Global Fight for Internet TrustThe Global Fight for Internet Trust
The Global Fight for Internet Trust
 
Web application security part 02
Web application security part 02Web application security part 02
Web application security part 02
 
Dr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talkDr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talk
 
Web security
Web securityWeb security
Web security
 
Explain the role of the certificate authority and registration autho.pdf
Explain the role of the certificate authority and registration autho.pdfExplain the role of the certificate authority and registration autho.pdf
Explain the role of the certificate authority and registration autho.pdf
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commerce
 
Web services security_in_wse_3_ppt
Web services security_in_wse_3_pptWeb services security_in_wse_3_ppt
Web services security_in_wse_3_ppt
 
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...
 
InfoSecurity Europe 2015 - Identities Exposed by David Johansson
InfoSecurity Europe 2015 - Identities Exposed by David JohanssonInfoSecurity Europe 2015 - Identities Exposed by David Johansson
InfoSecurity Europe 2015 - Identities Exposed by David Johansson
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 

More from proser tech

New search engine Alternative for Google..
New search engine Alternative for Google..New search engine Alternative for Google..
New search engine Alternative for Google..proser tech
 
Windows xp services
Windows xp servicesWindows xp services
Windows xp servicesproser tech
 
Active directory domain and trust
Active  directory  domain  and  trustActive  directory  domain  and  trust
Active directory domain and trustproser tech
 
Windows xp services
Windows xp servicesWindows xp services
Windows xp servicesproser tech
 
Windows profile how do i
Windows profile how do iWindows profile how do i
Windows profile how do iproser tech
 
A z index of the windows cmd command line
A z index of the windows cmd command lineA z index of the windows cmd command line
A z index of the windows cmd command lineproser tech
 
Difference between ntfs and fat32
Difference between ntfs and fat32Difference between ntfs and fat32
Difference between ntfs and fat32proser tech
 
Excell shortcuts
Excell shortcutsExcell shortcuts
Excell shortcutsproser tech
 
Pavan Gadey Marriage Invitation Card
Pavan Gadey Marriage Invitation CardPavan Gadey Marriage Invitation Card
Pavan Gadey Marriage Invitation Cardproser tech
 
SpN corporate PPt
SpN corporate PPtSpN corporate PPt
SpN corporate PPtproser tech
 

More from proser tech (19)

New search engine Alternative for Google..
New search engine Alternative for Google..New search engine Alternative for Google..
New search engine Alternative for Google..
 
Windows profile
Windows profileWindows profile
Windows profile
 
Windows xp services
Windows xp servicesWindows xp services
Windows xp services
 
Outlook Express
Outlook ExpressOutlook Express
Outlook Express
 
Exchange server
Exchange   serverExchange   server
Exchange server
 
Double routing
Double  routingDouble  routing
Double routing
 
Active directory domain and trust
Active  directory  domain  and  trustActive  directory  domain  and  trust
Active directory domain and trust
 
Vpn
VpnVpn
Vpn
 
Windows xp services
Windows xp servicesWindows xp services
Windows xp services
 
Windows profile
Windows profileWindows profile
Windows profile
 
Windows profile how do i
Windows profile how do iWindows profile how do i
Windows profile how do i
 
Network printer
Network printerNetwork printer
Network printer
 
A z index of the windows cmd command line
A z index of the windows cmd command lineA z index of the windows cmd command line
A z index of the windows cmd command line
 
Difference between ntfs and fat32
Difference between ntfs and fat32Difference between ntfs and fat32
Difference between ntfs and fat32
 
Excell shortcuts
Excell shortcutsExcell shortcuts
Excell shortcuts
 
Windows xp tips
Windows xp tipsWindows xp tips
Windows xp tips
 
Xlshortcuts07
Xlshortcuts07Xlshortcuts07
Xlshortcuts07
 
Pavan Gadey Marriage Invitation Card
Pavan Gadey Marriage Invitation CardPavan Gadey Marriage Invitation Card
Pavan Gadey Marriage Invitation Card
 
SpN corporate PPt
SpN corporate PPtSpN corporate PPt
SpN corporate PPt
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Certification authority

  • 1. Certificate authority In cryptography, a certificate authority or certification authority (CA) is an entity which issues digital certificates for use by other parties. It is an example of a trusted third party. CAs are characteristic of many public key infrastructure (PKI) schemes. There are many commercial CAs that charge for their services. Institutions and governments may have their own CAs, and there are free CAs. Issuing a certificate A CA will issue a public key certificate which states that the CA attests that the public key contained in the certificate belongs to the person, organization, server, or other entity noted in the certificate. A CA's obligation in such schemes is to verify an applicant's credentials, so that users (relying parties) can trust the information in the CA's certificates. The usual idea is that if the user trusts the CA and can verify the CA's signature, then they can also verify that a certain public key does indeed belong to whomever is identified in the certificate. List of certificate authorities Here is a list of some common certificate authorities (CA). For a CA to be of any use, the client must trust the CA. In case of a browser visiting a web site with a certificate, the CA for that certificate should ideally be known by the browser. If not, the user will be asked whether to trust the CA. Some of the CAs below claim to be known by 99% of all browsers.[1] • VeriSign • Thawte • Entrust • QuoVadis • GoDaddy • Cacert (free CA) • EJBCA Scenario for Securing the Web Server using CA( Certification Authority) Socket Address The combination of the IP Address and Port Number is called as Socket Address.
  • 2. Steps to Secure the IIS using Certification Authority: 1.Create one web site in IIS Web Server IP 100.0.0.2 M 255.0.0.0 2.Install the Certification Authority Certification Authority Server IP 100.0.0.1 M 255.0.0.0 3.Seuring the Web Server using ( Server Certificate ) a. Obtain Web Server Certificate from Web Server Steps to obtain the Server Certificate : 1.Go to Properties of the Web Server Web site 2. Select the Directory Security -> Server Certificate -> Next -> Create a new Certificate ->Send the Request Immedate to the online Certification Authority -> Next ………. 3.Go to Properties of the Web Server Web site -> Genral -> SSL Port 1234 -> OK 4.Try to access the web site at the client side. ( The Response is : The must be viewed over a secure Channel ) Steps to download the Client Certificate from the Certification Authority Client can use the Certification Authority Web site to download the Client Certificate Steps to download : 1. mmc -> console-> add/Remove snap-in -> add -> Certificates -> My user Account -> OK SSL ( Secure Socket Layer ) pronounced as separate letters) Short for Secure Sockets Layer, a protocol developed by Netscape for transmitting private documents via the Internet. SSL uses a cryptographic system that uses two keys to encrypt data − a public key known to everyone and a private or secret key known only to the recipient of the message. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers.By convention, URLs that require an SSL connection start with https. Meer Shahnawaz ( Abdullah ) Netmetric Solutions ,
  • 3. # 101 ALI Manor , Masab Tank , Hyderabad.