22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 6-10 Cross-certification between two organizations<br />

Cross-certification between two users<br />

In this case, the cross-certification can be for two users, two servers, or a user<br />

and a server.<br />

Let’s assume a scenario in which the Acme and Widget organizations want to<br />

replicate a database that contains information of common interest, but don’t want<br />

to have anything but these two servers communicating with each another, as per<br />

their security policy.<br />

Here, the organizations want the most restrictive form of cross-certification, in<br />

that they want a server in one organization to authenticate and replicate with a<br />

server in the other organization. The following steps will accomplish this:<br />

1. The Acme server (Server/Acme) obtains a cross-certificate for the Widget<br />

server (Server/Widget) and stores it in the Acme server Personal Address<br />

Book;<br />

2. The Widget server (Server/Widget) obtains a cross-certificate for the Acme<br />

server (Server/Acme) and stores it in the Widget server Personal Address<br />

Book.<br />

As a result of this procedure, a special relationship (that is, “the Acme server and<br />

the Widget server trust each other”) is established. This is illustrated in<br />

Figure 6-11 on page 214. In this cross-certification model, only these two servers<br />

trust each another and can replicate with each other.<br />

Chapter 6. Public key infrastructures 213

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!