22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 6-24 Warning message of an untrusted site<br />

Note: It is not wise, specially for intranet sites, to establish a server that<br />

provides SSL connections, but for which the server certificate is not issued<br />

from a known and trusted certificate. Sure, users can be told to accept access<br />

to a host that appears untrusted, but that’s a serious precedent to set and<br />

could undermine the security of the organization in that users will be more<br />

likely to trust sites they shouldn’t when connecting to the Internet from the<br />

corporate network. It is a best practice to purchase a certificate from one of<br />

the known CAs, such as VeriSign.<br />

Serving certificates to browsers<br />

Since a public key certificate provides proof of identity, it is reasonable to<br />

assume that the level of proof needed for a client is much lower than that needed<br />

for a server.<br />

Before providing a server certificate, the CA will require documentary proof of the<br />

legitimacy of the request. For a client, this proof can often be provided online,<br />

because a lower level of checking is needed. This is especially true of an intranet<br />

environment. Certificate server products are initially intended for organizations<br />

that want to set up an internal authentication process.<br />

Netscape uses a different mechanism than other browsers (such as Mozilla,<br />

Opera, IE, Lynx, and so forth) for initiating a client certificate request.<br />

Chapter 6. Public key infrastructures 259

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!