03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

►<br />

►<br />

Issuing a list of revoked certificates<br />

Protection of the private key<br />

Figure 2-6 shows three different certification scenarios in one picture.<br />

Root B<br />

Certificate<br />

Authorty<br />

cross<br />

certification<br />

Root A<br />

Certificate<br />

Authorty<br />

Organization C<br />

Certificate<br />

Authorty<br />

Organization A<br />

Certificate<br />

Authorty<br />

Organization B<br />

Certificate<br />

Authorty<br />

Secured communication<br />

User D<br />

User A<br />

User B<br />

User C<br />

Figure 2-6 Simple certification scenarios<br />

The certification scenarios depicted above are as follows:<br />

► When User A wants to talk to User B, both of their certificates are issued and<br />

signed by the same Certificate Authority (Organization A); they can trust each<br />

other, and the secure communication will build up based on the trust.<br />

► When User A or User B wants to talk to User C, their certificates are coming<br />

from the same Root Certificate Authority (Root A); they can trust each other<br />

again. This scenario shows the hierarchy of the certificates, where the<br />

certificate has been signed by a chain of CAs. As long as the two parties have<br />

mutual Certificate Authorities along the line, they can trust each other.<br />

► When User D wants to talk to User A or User B or User C, their certification<br />

paths are different. To resolve the problem, the two root Certificate Authorities<br />

(Root A, Root B) can set up a trust between each other by setting up a cross<br />

certification. Once the two parties have cross certified CAs along the path,<br />

they can trust each other.<br />

Chapter 2. <strong>Security</strong> fundamentals 17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!