"SSL provides secure connections by allowing two applications connectingover a network connection to authenticate each other's identity. Additionally, SSL provides encryption of the data exchanged between the applications. Authentication allows a server (one-way) and optionally a client (two-way) to verify the identity of the application on the other end of a network connection. Encryption makes data transmitted over the network intelligible only to the intended recipient.
Features of SSL include the following concepts:
An application participating in an SSL connection is authenticated when the other party evaluates and accepts their digital certificate. A digital certificate used to authenticate is validated by an associated root CA certificate located on the receiving application. Web browsers, servers, and other SSL-enabled applications generally acceptas genuine any digital certificate that is signed by a trusted Certificate Authority and is otherwise valid. For example, a digital certificate can be invalidated because it has expired or the digital certificate of the Certificate Authority used to sign it expired. A server certificate can be invalidatedif the host name in the digital certificate of the server does not match the host name specified by the client." - IBM Tivoli
Features of SSL include the following concepts:
- SSL provides a mechanism for one application to authenticate itself to another application.
- One-way SSL allows one application to be certain of the identity of the other application.
- Two-way SSL (mutual authentication) allows both applications to be certain of the identity of each other.
- The application that assumes the "server" role possesses and uses a server-side certificate to prove its identity to the client application.
- In mutual authentication, the application that assumes the "client" role possesses and uses a client-side certificate to prove its identity to the server application.
- The application that is presented with a certificate must have in its possession the root certificate (or certificate chain) of the CertificateAuthority (CA) that signed the certificate being presented. The root CA certificate, or chain, validates the certificate being presented.
- In client connections, the client browser alerts the user when presented with a certificate that is not issued by a recognized Certificate Authority.
An application participating in an SSL connection is authenticated when the other party evaluates and accepts their digital certificate. A digital certificate used to authenticate is validated by an associated root CA certificate located on the receiving application. Web browsers, servers, and other SSL-enabled applications generally acceptas genuine any digital certificate that is signed by a trusted Certificate Authority and is otherwise valid. For example, a digital certificate can be invalidated because it has expired or the digital certificate of the Certificate Authority used to sign it expired. A server certificate can be invalidatedif the host name in the digital certificate of the server does not match the host name specified by the client." - IBM Tivoli
No comments:
Post a Comment