SlideShare a Scribd company logo
1 of 33
Download to read offline
Who are you?
Authentication by Certificates
Stefan Bamberg | Senior Key Account Manager
stefan.bamberg@wibu.com
Philipp Luedtke| R&D Software
philipp.luedtke@wibu.com
Introduction to certificates
Application Scenarios
CodeMeter Certificate Vault
Who are you?
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 2
Proof of identity – Examples
▪ In certain situations, persons must identify themselves, i.e. you must prove
your identity with legal certainty, e.g.:
▪ Police checks
▪ Opening a bank account
▪ Registration of a new vehicle
▪ Purchase of alcohol (proof of age)
▪ Check-in at airports
▪ And many more
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 3
Proof of identity – Process
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates
Authority
The ID document
is issued
Check of the
ID document
Proof of identity by identity document
Result of
the check
Approval or Rejection
4
Proof of identity – Digital and automated?
▪ Authentication is essential for secure digital communication and secure
networks
▪ Persons must authenticate themselves to machines and applications
▪ Machines must authenticate to other machines
How do we make this work
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates
?
5
(X.509v3) Certificates
Asymmetric Encryption
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates
Digital Certificates
PKI
6
Excursus: Asymmetric cryptography
▪ Symmetric Cryptography
▪ One key to encrypt and decrypt
▪ AES (Advanced Encryption Standard) is a symmetrical procedure
▪ Is used for large amounts of data thanks to its fast speed
▪ Asymmetric Cryptography = Public Key Cryptography
▪ Key pair: private and public keys
▪ It’s impossible to derive the private key from the public key
▪ RSA (named after Rivest, Shamir, and Adleman) is an asymmetrical procedure
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 7
Example: E-Mail encryption
▪ Use of asymmetric encryption
▪ Alice wants to send Bob an encrypted email
▪ Challenge: Key distribution
▪ Solution: Digital certificate
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates
Alice Bob
Bob‘s public key
Encrypted with Bob‘s
public key
Bob‘s private
key
8
What is a digital certificate?
▪ A digital certificate
▪ links identities with cryptographic keys
▪ contains information about an entity (process participant)
▪ contains the public key of the entity
▪ has a standardized structure (RFC 5280)
▪ comes with a signature calculated from the information the certificate holds
▪ can be checked for authenticity using cryptographic methods
▪ can be checked for integrity using cryptographic methods
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 9
Structure of an X.509v3 certificate
▪ A X.509v3 certificate includes among others the following elements:
▪ Version number and serial number
▪ Name of the issuer
▪ Name of the subject
▪ Period of validity
▪ Information on the holder's public key
▪ Information on the intended use of the certificate ("extensions")
▪ Digital signature
▪ Encryption algorithms used
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 10
Example: Certificate content (Demo)
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 11
Public Key Infrastructure (PKI)?
Proof of identity – Analogue vs. digital
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates
The ID document
is issued
The ID document
is checked
Result of
the check
Approval or Rejection
The certificate
is issued
The certificate
is checked
Approval or Rejection
Authority
12
Public Key Infrastructure (PKI)
▪ A PKI
▪ is actually an infrastructure – not just a software program
▪ consists of Certificate Authorities (CAs) (+ processes)
▪ is hierarchically structured as follows
▪ Root CA
▪ Derived subordinate CAs
▪ Every Certification Authority holds a key pair and a certificate
▪ issues and manages certificates
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 13
PKI Structure – Example
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates
Root CA
Sub-CA
B
Sub-CA
A
Sub-CA
C
issues end user certificate
Self-signed
Root certificate
issues Sub-CA
certificate
14
Example: Certificate Enrollment
▪ Certificate Enrollment
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates
Root CA
1. Signed certificate request
(CSR)
Alice 3. Alice‘s certificate
signed by the CA
2. Alice‘s identity
is checked
15
Root CA
Example: Certificate examination
▪ Certificate verification
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates
Bob checks:
1. Do I trust the root CA of Alice?
2. Is the Root CA certificate valid?
3. Is Alice's certificate valid?
Alice Bob
Bob trusts
16
Application Scenarios
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 17
Application scenarios
▪ E-mail encryption / signature, document signature
▪ e.g. Microsoft Outlook, Mozilla Thunderbird, Adobe Acrobat, OpenOffice, …
▪ Securing communication on the web
▪ e.g., HTTPS or TLS, VPN, …
▪ Authentication on machines and applications
▪ e.g. Windows smart card logon, SSH, …
▪ Secure communication and authentication in industrial environments
▪ e.g. OPC UA, …
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 18
Challenges
▪ Rollout of certificates
▪ How is the authorization check performed?
▪ How is the technical rollout of certificates carried out?
▪ Where do I keep the keys safely?
▪ Withdrawal of certificates
▪ How is the authorization check performed?
▪ How is the certificate revocation made public?
▪ When to check the certificate revocation (Time of Revocation vs. Time of Check)?
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 19
CodeMeter Certificate Vault
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 20
Why CodeMeter Certificate Vault
▪ Simplification of the overall process of certificate usage
▪ Support of the standard interfaces PKCS#11, KSP, and OpenSSL
▪ Enrollment and update of keys/certificates via CodeMeter License Central online
and offline
▪ Integration of CodeMeter License Central into existing certificate management
systems via web service interfaces
▪ Storage of keys and certificates in a secure hardware anchor (Dongle)
▪ Storage of keys and certificates in a CmDongle embedding a security smart card
chip (Infineon SLE97)
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 21
Application scenario: Industry
▪ Additional security in industrial environments
▪ OPC UA (Standard for platform-independent data exchange)
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 22
Secure anchor for keys and certificates
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates
Several
Form factors
One
Technology
23
Use of proven technology
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates
▪ License entry = Firm Code | Product Code
▪ Firm Code: assigned by Wibu-Systems
▪ Product Code:
▪ Chosen by the ISV
▪ 4 billion Product Codes (UInt32)
▪ Product Item Options: Each license can have
combinable options
▪ Among others key and certificate storage
Firm Code: 6.000.010
…
Product Item Options
Product Code: 201.000
Product Item Options
Product Code: 201.001
Product Item Options
Product Code: 201.002
24
Product Item Options
© WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates
Text
License Quantity
Activation Time
Expiration Time
License Transfer
Linger Time
User Data
Protected Data /
Extended Protected Data
Customer Own License
Information
Named User License Hidden Data
Secret Data
Usage Period
Unit Counter
Feature Map
Maintenance Period
Minimum Runtime Version
24.6.2020
Module Items
25
License Structure
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates
FirmCode1
ProduktCode1 Secret data
Protected data
Product Item Option
…
ProduktCode2
…
Secret data
Protected data
Product Item Option
…
26
Storage of keys and certificates
▪ Using Product Codes you can store many keys and certificates on a single
CmDongle:
▪ Copying is not possible because storage is happening in the smart card chip!
▪ Protected/Extended Protected Data for storing certificates
▪ Secret Data for key storage
▪ Cannot be read!
▪ Works only with the key
▪ Each Product Code represents a key/certificate via the parent Product Item Options
▪ Update of CmDongles possibile online and offline (for industrial setups)
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 27
Support of standard protocols
▪ CodeMeter Certificate Vault
▪ operates as a PKCS#11 compliant token provider
▪ can be integrated as Key Storage Provider (KSP) in the Microsoft Cryptographic API
Next Generation (CNG)
▪ can be used with the OpenSSL API to securely store and use the keys of TLS
certificates
▪ Integration in applications such as browsers, VPNs and e-mail clients is
therefore already standard
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 28
Demo
▪ Authentication using PKCS#11 on a web page
▪ Creation of a certificate via OpenSSL
▪ Encryption of a file using OpenSSL
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates
Demo
29
Integration in CA and rollout of certificates
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 30
Person/DeviceIssuer
CodeMeter License Central – Ticket system for distribution
24.6.2020
Ticket + Fingerprint
4
Rollout
5
Ticket
2
Request
1Management
system
Software
License Portal
Ticket:
ABCDE-12345-KLMNO-67890-UVWXY
3
© WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 31
Overview of CodeMeter Certificate Vault
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates
▪ Support of standard
interfaces
▪ Simplification of the
complex processes
related to distribution
and secure storage
▪ Use of the proven
CodeMeter
technology
Legend:
Turquoise: available
32
https://www.wibu.com
info@wibu.com
Europe: +49-721-931720
USA: +1-425-7756900
China: +86-21-55661790
Japan: +81-3-43608205
Thank You – Q&A
24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 33

More Related Content

What's hot

AxiaMed_6 facts about P2PE
AxiaMed_6 facts about P2PEAxiaMed_6 facts about P2PE
AxiaMed_6 facts about P2PEcklacking
 
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...OpenIDFoundation
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitAlan Quayle
 
Computer Security Test
Computer Security TestComputer Security Test
Computer Security Testkhant14
 
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGCPKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGCNizar Ben Neji
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
 
FIDO, PKI & beyond: Where Authentication Meets Identification
 FIDO, PKI & beyond: Where Authentication Meets Identification FIDO, PKI & beyond: Where Authentication Meets Identification
FIDO, PKI & beyond: Where Authentication Meets IdentificationFIDO Alliance
 
Ledger Meetup Bitcoin à Tours
Ledger Meetup Bitcoin à ToursLedger Meetup Bitcoin à Tours
Ledger Meetup Bitcoin à ToursJulien Trottier
 

What's hot (9)

AxiaMed_6 facts about P2PE
AxiaMed_6 facts about P2PEAxiaMed_6 facts about P2PE
AxiaMed_6 facts about P2PE
 
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummit
 
BeingSign blockchain-based online signing system|Introduction
BeingSign blockchain-based online signing system|IntroductionBeingSign blockchain-based online signing system|Introduction
BeingSign blockchain-based online signing system|Introduction
 
Computer Security Test
Computer Security TestComputer Security Test
Computer Security Test
 
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGCPKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 
FIDO, PKI & beyond: Where Authentication Meets Identification
 FIDO, PKI & beyond: Where Authentication Meets Identification FIDO, PKI & beyond: Where Authentication Meets Identification
FIDO, PKI & beyond: Where Authentication Meets Identification
 
Ledger Meetup Bitcoin à Tours
Ledger Meetup Bitcoin à ToursLedger Meetup Bitcoin à Tours
Ledger Meetup Bitcoin à Tours
 

Similar to Who are you? Authentication by certificates

Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesteam-WIBU
 
Best practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFsBest practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFsiText Group nv
 
Slide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate AuthoritySlide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate Authoritywebhostingguy
 
DigiCert EV Code Signing Certificate Feature and Benefits
DigiCert EV Code Signing Certificate Feature and BenefitsDigiCert EV Code Signing Certificate Feature and Benefits
DigiCert EV Code Signing Certificate Feature and BenefitsCodeSigningStore
 
Offer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteOffer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteKeynectis
 
How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?Keynectis
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudControlCase
 
Vendor Training.ppt
Vendor Training.pptVendor Training.ppt
Vendor Training.pptAMIYA DAS
 
CCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_FinalCCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_FinalGreg Posten
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsUlf Mattsson
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 PresentationAmy McMullin
 
How EverTrust Horizon PKI Automation can help your business?
How EverTrust Horizon PKI Automation can help your business?How EverTrust Horizon PKI Automation can help your business?
How EverTrust Horizon PKI Automation can help your business?mirmaisam
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
ReCertifying Active Directory
ReCertifying Active DirectoryReCertifying Active Directory
ReCertifying Active DirectoryWill Schroeder
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Brian Spector
 
COMODO Certificate Manager
COMODO Certificate ManagerCOMODO Certificate Manager
COMODO Certificate ManagerAnita Benett
 

Similar to Who are you? Authentication by certificates (20)

Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
 
globalsign-131113043043-phpapp01
globalsign-131113043043-phpapp01globalsign-131113043043-phpapp01
globalsign-131113043043-phpapp01
 
Best practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFsBest practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFs
 
Slide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate AuthoritySlide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate Authority
 
DigiCert EV Code Signing Certificate Feature and Benefits
DigiCert EV Code Signing Certificate Feature and BenefitsDigiCert EV Code Signing Certificate Feature and Benefits
DigiCert EV Code Signing Certificate Feature and Benefits
 
Offer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteOffer a trustworthy environment on your web site
Offer a trustworthy environment on your web site
 
How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the Cloud
 
Vendor Training.ppt
Vendor Training.pptVendor Training.ppt
Vendor Training.ppt
 
CCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_FinalCCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_Final
 
#broof
#broof#broof
#broof
 
Dapp
DappDapp
Dapp
 
TOP FEATURES OF CertiDApp
TOP FEATURES OF CertiDAppTOP FEATURES OF CertiDApp
TOP FEATURES OF CertiDApp
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private clouds
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 Presentation
 
How EverTrust Horizon PKI Automation can help your business?
How EverTrust Horizon PKI Automation can help your business?How EverTrust Horizon PKI Automation can help your business?
How EverTrust Horizon PKI Automation can help your business?
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
ReCertifying Active Directory
ReCertifying Active DirectoryReCertifying Active Directory
ReCertifying Active Directory
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016
 
COMODO Certificate Manager
COMODO Certificate ManagerCOMODO Certificate Manager
COMODO Certificate Manager
 

More from team-WIBU

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Securityteam-WIBU
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Togetherteam-WIBU
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basicsteam-WIBU
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuitätteam-WIBU
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityteam-WIBU
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenariosteam-WIBU
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practicesteam-WIBU
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses Moreteam-WIBU
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edgeteam-WIBU
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applicationsteam-WIBU
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magicteam-WIBU
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisiveteam-WIBU
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...team-WIBU
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licensesteam-WIBU
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetiteteam-WIBU
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxteam-WIBU
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solutionteam-WIBU
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsteam-WIBU
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to lastteam-WIBU
 

More from team-WIBU (20)

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Security
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Together
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basics
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuity
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenarios
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practices
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses More
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edge
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applications
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magic
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisive
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licenses
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetite
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptx
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solution
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environments
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to last
 

Recently uploaded

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 

Recently uploaded (20)

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 

Who are you? Authentication by certificates

  • 1. Who are you? Authentication by Certificates Stefan Bamberg | Senior Key Account Manager stefan.bamberg@wibu.com Philipp Luedtke| R&D Software philipp.luedtke@wibu.com Introduction to certificates Application Scenarios CodeMeter Certificate Vault
  • 2. Who are you? 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 2
  • 3. Proof of identity – Examples ▪ In certain situations, persons must identify themselves, i.e. you must prove your identity with legal certainty, e.g.: ▪ Police checks ▪ Opening a bank account ▪ Registration of a new vehicle ▪ Purchase of alcohol (proof of age) ▪ Check-in at airports ▪ And many more 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 3
  • 4. Proof of identity – Process 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates Authority The ID document is issued Check of the ID document Proof of identity by identity document Result of the check Approval or Rejection 4
  • 5. Proof of identity – Digital and automated? ▪ Authentication is essential for secure digital communication and secure networks ▪ Persons must authenticate themselves to machines and applications ▪ Machines must authenticate to other machines How do we make this work 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates ? 5
  • 6. (X.509v3) Certificates Asymmetric Encryption 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates Digital Certificates PKI 6
  • 7. Excursus: Asymmetric cryptography ▪ Symmetric Cryptography ▪ One key to encrypt and decrypt ▪ AES (Advanced Encryption Standard) is a symmetrical procedure ▪ Is used for large amounts of data thanks to its fast speed ▪ Asymmetric Cryptography = Public Key Cryptography ▪ Key pair: private and public keys ▪ It’s impossible to derive the private key from the public key ▪ RSA (named after Rivest, Shamir, and Adleman) is an asymmetrical procedure 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 7
  • 8. Example: E-Mail encryption ▪ Use of asymmetric encryption ▪ Alice wants to send Bob an encrypted email ▪ Challenge: Key distribution ▪ Solution: Digital certificate 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates Alice Bob Bob‘s public key Encrypted with Bob‘s public key Bob‘s private key 8
  • 9. What is a digital certificate? ▪ A digital certificate ▪ links identities with cryptographic keys ▪ contains information about an entity (process participant) ▪ contains the public key of the entity ▪ has a standardized structure (RFC 5280) ▪ comes with a signature calculated from the information the certificate holds ▪ can be checked for authenticity using cryptographic methods ▪ can be checked for integrity using cryptographic methods 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 9
  • 10. Structure of an X.509v3 certificate ▪ A X.509v3 certificate includes among others the following elements: ▪ Version number and serial number ▪ Name of the issuer ▪ Name of the subject ▪ Period of validity ▪ Information on the holder's public key ▪ Information on the intended use of the certificate ("extensions") ▪ Digital signature ▪ Encryption algorithms used 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 10
  • 11. Example: Certificate content (Demo) 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 11
  • 12. Public Key Infrastructure (PKI)? Proof of identity – Analogue vs. digital 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates The ID document is issued The ID document is checked Result of the check Approval or Rejection The certificate is issued The certificate is checked Approval or Rejection Authority 12
  • 13. Public Key Infrastructure (PKI) ▪ A PKI ▪ is actually an infrastructure – not just a software program ▪ consists of Certificate Authorities (CAs) (+ processes) ▪ is hierarchically structured as follows ▪ Root CA ▪ Derived subordinate CAs ▪ Every Certification Authority holds a key pair and a certificate ▪ issues and manages certificates 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 13
  • 14. PKI Structure – Example 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates Root CA Sub-CA B Sub-CA A Sub-CA C issues end user certificate Self-signed Root certificate issues Sub-CA certificate 14
  • 15. Example: Certificate Enrollment ▪ Certificate Enrollment 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates Root CA 1. Signed certificate request (CSR) Alice 3. Alice‘s certificate signed by the CA 2. Alice‘s identity is checked 15
  • 16. Root CA Example: Certificate examination ▪ Certificate verification 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates Bob checks: 1. Do I trust the root CA of Alice? 2. Is the Root CA certificate valid? 3. Is Alice's certificate valid? Alice Bob Bob trusts 16
  • 17. Application Scenarios 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 17
  • 18. Application scenarios ▪ E-mail encryption / signature, document signature ▪ e.g. Microsoft Outlook, Mozilla Thunderbird, Adobe Acrobat, OpenOffice, … ▪ Securing communication on the web ▪ e.g., HTTPS or TLS, VPN, … ▪ Authentication on machines and applications ▪ e.g. Windows smart card logon, SSH, … ▪ Secure communication and authentication in industrial environments ▪ e.g. OPC UA, … 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 18
  • 19. Challenges ▪ Rollout of certificates ▪ How is the authorization check performed? ▪ How is the technical rollout of certificates carried out? ▪ Where do I keep the keys safely? ▪ Withdrawal of certificates ▪ How is the authorization check performed? ▪ How is the certificate revocation made public? ▪ When to check the certificate revocation (Time of Revocation vs. Time of Check)? 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 19
  • 20. CodeMeter Certificate Vault 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 20
  • 21. Why CodeMeter Certificate Vault ▪ Simplification of the overall process of certificate usage ▪ Support of the standard interfaces PKCS#11, KSP, and OpenSSL ▪ Enrollment and update of keys/certificates via CodeMeter License Central online and offline ▪ Integration of CodeMeter License Central into existing certificate management systems via web service interfaces ▪ Storage of keys and certificates in a secure hardware anchor (Dongle) ▪ Storage of keys and certificates in a CmDongle embedding a security smart card chip (Infineon SLE97) 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 21
  • 22. Application scenario: Industry ▪ Additional security in industrial environments ▪ OPC UA (Standard for platform-independent data exchange) 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 22
  • 23. Secure anchor for keys and certificates 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates Several Form factors One Technology 23
  • 24. Use of proven technology 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates ▪ License entry = Firm Code | Product Code ▪ Firm Code: assigned by Wibu-Systems ▪ Product Code: ▪ Chosen by the ISV ▪ 4 billion Product Codes (UInt32) ▪ Product Item Options: Each license can have combinable options ▪ Among others key and certificate storage Firm Code: 6.000.010 … Product Item Options Product Code: 201.000 Product Item Options Product Code: 201.001 Product Item Options Product Code: 201.002 24
  • 25. Product Item Options © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates Text License Quantity Activation Time Expiration Time License Transfer Linger Time User Data Protected Data / Extended Protected Data Customer Own License Information Named User License Hidden Data Secret Data Usage Period Unit Counter Feature Map Maintenance Period Minimum Runtime Version 24.6.2020 Module Items 25
  • 26. License Structure 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates FirmCode1 ProduktCode1 Secret data Protected data Product Item Option … ProduktCode2 … Secret data Protected data Product Item Option … 26
  • 27. Storage of keys and certificates ▪ Using Product Codes you can store many keys and certificates on a single CmDongle: ▪ Copying is not possible because storage is happening in the smart card chip! ▪ Protected/Extended Protected Data for storing certificates ▪ Secret Data for key storage ▪ Cannot be read! ▪ Works only with the key ▪ Each Product Code represents a key/certificate via the parent Product Item Options ▪ Update of CmDongles possibile online and offline (for industrial setups) 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 27
  • 28. Support of standard protocols ▪ CodeMeter Certificate Vault ▪ operates as a PKCS#11 compliant token provider ▪ can be integrated as Key Storage Provider (KSP) in the Microsoft Cryptographic API Next Generation (CNG) ▪ can be used with the OpenSSL API to securely store and use the keys of TLS certificates ▪ Integration in applications such as browsers, VPNs and e-mail clients is therefore already standard 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 28
  • 29. Demo ▪ Authentication using PKCS#11 on a web page ▪ Creation of a certificate via OpenSSL ▪ Encryption of a file using OpenSSL 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates Demo 29
  • 30. Integration in CA and rollout of certificates 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 30
  • 31. Person/DeviceIssuer CodeMeter License Central – Ticket system for distribution 24.6.2020 Ticket + Fingerprint 4 Rollout 5 Ticket 2 Request 1Management system Software License Portal Ticket: ABCDE-12345-KLMNO-67890-UVWXY 3 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 31
  • 32. Overview of CodeMeter Certificate Vault 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates ▪ Support of standard interfaces ▪ Simplification of the complex processes related to distribution and secure storage ▪ Use of the proven CodeMeter technology Legend: Turquoise: available 32
  • 33. https://www.wibu.com info@wibu.com Europe: +49-721-931720 USA: +1-425-7756900 China: +86-21-55661790 Japan: +81-3-43608205 Thank You – Q&A 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 33