IMPLEMENTING A PUBLIC-KEY INFRASTRUCTURE FOR THE ACADEMIC ENVIRONMENT

Size: px
Start display at page:

Download "IMPLEMENTING A PUBLIC-KEY INFRASTRUCTURE FOR THE ACADEMIC ENVIRONMENT"

Transcription

1 BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Tomul LVII (LXI), Fasc. 3, 2011 SecŃia AUTOMATICĂ şi CALCULATOARE IMPLEMENTING A PUBLIC-KEY INFRASTRUCTURE FOR THE ACADEMIC ENVIRONMENT BY MARIUS MARIAN and ANDREI PÎRVAN University of Craiova, Department of Computers and Information Technology Received: August 23, 2011 Accepted for publication: September 14, 2011 Abstract. This paper presents a pilot deployment and implementation of a public-key infrastructure within the IT academic environment of University of Craiova. PKIs are both useful and complex security-enabling instruments. Without a careful analysis and planning, it becomes difficult to find a way to alleviate its complexity and impact on end users and decision makers. Best practices concerning PKI can be derived from precedent and alternative experiences, and therefore they can help throughout the PKI setup and maintenance. Key words: public-key infrastructure, security services Mathematics Subject Classification: 91G Introduction The need to protect information in transit is justified today by the overwhelming means of communication available today and by the continuously increasing amount of critical data that is no longer processed on paper. The educational environments make no exception. Corresponding author: marius.marian@cs.ucv.ro

2 144 Marius Marian and Andrei Pîrvan Our paper presents the implementation of a pilot infrastructure that was built, tested and currently is in operation within the Faculty of Automation, Computers and Electronics of the University of Craiova. This public-key infrastructure (PKI) will allow us to further analyse the security requirements and also the reaction of the local community that will use this security infrastructure. This analysis will be the test bed for the eventual growth of the PKI at a wider level by incorporating new certification authorities pertaining to other faculties or universities manifesting interest for the adoption of this security paradigm. 2. The Security Issues After an internal security evaluation of the local IT environment, we have found out that most of our academic IT services (dedicated local area networks, individual accounts, file-/web-servers, critical administrative applications and services) provided by and within the university are authenticated by means of usernames and passwords. Concerning confidentiality and privacy, we have discovered that just very few of the administrative services and none of the accounts are taking care of this aspect. Integrity-checking or time-stamping services are also not available on a large scale within our IT environment. Furthermore, there is not enforced an automatic traceability of individual user responsibility for events taking place from within our IT environment. Although within our university networking infrastructure we have moderate up to highly protected areas, we still lack security at individual level. A large part of this delicate and sometimes embarrassing situation derives from the fact that the security issue was not tackled in a holistic manner right from the start (i.e. when the on-line services were introduced). It is probable that this slow, prudent adjustment to the new security reality is the case with most of our large institutions in the public sector. An important thing would have been a security policy for the entire IT environment of the University of Craiova, but this is still lacking due to the diversity and geographical distribution of the participants (20 faculties and 9 special-purpose departments in two cities and multiple distinct locations). All these participants are subordinated to the University, but they enjoy a significant level of administrative autonomy that has made difficult so far enforcing such a centralized security policy. Even so, the security issues remain and have to be solved even without a centralized security policy. Another interesting example for our proposal concerns the Students Evidence service which basically provides to students their academic status (number and types of exams passed, scheduled exams, grades obtained for each exam, etc.). Such a service requires a consistent level of privacy and confidentiality. Currently, the students accessing this service are identified by means of their personal numeric

3 Bul. Inst. Polit. Iaşi, t. LVII (LXI), f. 3, identifier (PNI). This solution was chosen because of the ease in management. The problem with the PNI is that it is a governmentally-assigned number and according to the latest Romanian laws concerning citizens privacy rights, it should remain private and be allowed for processing only when two conditions are met: first, it exists an explicit written agreement from the owner and second, when a law has already described and allowed that type of processing of the PNI. None of these conditions are met and therefore the Students Evidence service must change as soon as possible the approach for identifying its users. An immediate solution would be at central level to start assigning new electronic identifiers for all students by using the students registration numbers (matriculations). Last but not least important is the issue of institutional . Here too, after conducting an internal verification we have discovered that on one side, user authentication is based on username and password, and on the other side, the issues of confidentiality and privacy are in most cases neglected. The servers used do support these security features, but they are neither used nor enforced. In an open educational IT environment in which most of the employees and students are using wireless connectivity, leaving the traffic unprotected may become dangerous. messages can be intercepted and faked by third parties causing thus moral, economic and professional prejudices to the entitled/authorized peoples. One immediate solution for the administrators was to tunnel via the SSL protocol the communication between the client mail user agent and the server. Nevertheless, another sensitive problem may appear. Most servers today are handling and storing personal accounts by leaving the message data in clear. This is an issue if an attacker captures the root credentials of that server. In such a case, accounts of employees of a public institution can be vandalized, or only data mined (moreover, malevolent service administrators may abusively use their privileges to read the messages of higher-positioned colleagues in order to gain unauthorized information or even sell certain sensitive information). It becomes evident that a security infrastructure is necessary. And PKIs protect well applications demanding a high degree of security such as web services-based information processing systems, instant and messaging, and digital data signing. Moreover, PKIs support other security mechanisms such as firewalls, virtual private networks, and directories. 3. The Implementation 3.1. Basic Concepts Asymmetric cryptography is a robust and mature technique, dating from the mid 70s. In it, each participant holds a pair of cryptographic keys: one public (known by all other parties) and one private. This particular feature gave impetus and wide acceptance within the user community to this technique. The presence of a pair

4 146 Marius Marian and Andrei Pîrvan of keys is the reason why authentication and digital signature can be easily achieved by the participating entities. Other security properties such as confidentiality, integrity, and non-repudiation are also derived. Moreover, the fundamental issue of symmetric cryptography (i.e. secret key distribution) is here avoided. On the downside, it is generally recognized that public-key cryptographic algorithms are more complex, require more computational resources, produce larger outputs and demand longer times than traditional cryptography for basic operations such as encryption and decryption. Up to a certain point, the distribution of public keys seemed to give space to masquerade attacks against asymmetric cryptography. Digital certificates containing the value of the public key and the identity of its owner, signed by a trusted third party (TTP) were proposed to mitigate this problem. There are several standards that specify the format of public-key certificates. Among them, ITU-T Recommendation X.509 (ITU-T Recommendation X.509, 2005) is the most popular and is frequently employed in a multitude of other protocols and applications. This standard specifies a model of certification authorities that issue certificates for subordinated CAs and end entities (individual users, servers, network devices, etc.). Usually, a digital certificate issued by a CA will contain the public key, the identity of the entity owning the corresponding private key, the validity period and the serial number of the certificate, the name and the digital signature of the issuing CA, and a specific set of certificate extensions. The set of people, procedures, software, hardware used to create, manage, store, distribute, revoke and use digital certificates is called a public-key infrastructure (Shirey, 2000) Types of Certificates Our pilot CA will issue only a small subset of possible digital certificates. First of all, the format of these certificates is conform with the standard X.509 version 3, and similarly, the format for the certificate revocation lists is X.509 version 2. There will be issued client certificates, VPN certificates, SSL certificates, and less frequently, code signing certificates. Client certificates are used by individuals affiliated with the university. They will always contain the category of the subscriber (didactics, administration and support, students), and also her address. The VPN certificates are useful in establishing secure virtual networks using IPsec and they will mainly contain the IP address of the participating device/system and also the address of its human administrator. The SSL certificates will be used by the university s web-servers (also for the web-mail servers) for their own authentication and they will facilitate the enforcement of SSL tunnels between the client browsers and the server. Just as the previous category, these certificates will contain the DNS name of the server and also the address of the administrator. The code-signing certificates will be issued for certain development projects within the university perimeter.

5 Bul. Inst. Polit. Iaşi, t. LVII (LXI), f. 3, There is however one more type of certificates that we currently do not intend to approach. The so-called qualified certificates are conforming to the EU directive 1999/93/EC (EU Electronic Signature Directive, 1999). These certificates require that the issuing CA to be ascertained and authorized in operation by a state authority (i.e. in our case the Ministry for Communications and Information Society). Qualified certificates require particular fields to be present and also fulfilment of specific technical constraints for the issuer during the certificate creation and signing Selecting the Software Technology We have opted for an open-source PKI solution due to the budget limitation. There are several distributions available: DogTag (Redhat Fedora Project, Dogtag certification system, available on-line at PKI_Main_Page), EJBCA PrimeKey (open-source PKI, available on-line at primekey.se), NewPKI (open-source project, available on-line at newpki.org), OpenCA (open-source project, available on-line at openca.org), and OpenXPKI (open-source project, available on-line at openxpki.org). Of these we have focused on the three most popular implementations: DogTag, EJBCA, and OpenCA. DogTag Certificate Systems (DCS) is a PKI management software system developed by RedHat, and made publicly available. Unlike other PKI solutions, DCS employs Network Security Services (NSS) instead of the popular OpenSSL crypto-library. A modified version of DCS is employed by the US Department of Defense and handles approximately 10 million certificates. DCS is made up of 6 subcomponents: The Certificate Authority (CA) is responsible for the creation, issuance, renewal, revoking and publishing certificates and certificate revocation lists (CRL); The Data Recovery Manager is responsible for the management, storage and recovery of the private keys; The On-line Certificate Status Protocol Manager is an alternative to the static CRLs and is in charge with status notification for end-entities during the certificate validation process; The Registration Authority (RA) is in charge with the registration of certificate subscribers; The Token Processing System offers token usage support to the RA interfacing the smart-card managers with the other sub-systems.

6 148 Marius Marian and Andrei Pîrvan The second open-source PKI solution comes from a Swedish company called PrimeKey Solutions AB. This is developed in Java and is platform independent. The application is conform with the majority of current PKI standards, and also with Common Criteria requirements (Part. 1, Part. 2, Part. 3, 1999). It has a wide range of features and is very well suited for large communities of subscribers. For the future extension of the project, we consider this solution to be the perfect candidate. The last PKI solution analysed was OpenCA. This is a collaborative effort aimed to provide a framework for PKI studying and development of associated utilities. It offers support for the essential standards necessary for PKI operations, and in the same time it keeps the simplicity of the entire solution. This is the reason why we have chosen for our first implementation this solution. It fits well for a small to medium PKI community of subscribers as is the case with our implementation. Furthermore, starting with a simpler implementation allows building up the knowledge and experience in operating a PKI for the team in charge Structure of OpenCA The OpenCA solution is designed so that to be easily adapted to any hierarchical organization. One such example is given in Fig. 1. Fig. 1 An example of OpenCA components and design. The CA component is in charge with creation and revocation of certificates, and also for issuing CRLs. The RA can handle a variety of certificate signing requests (CSR). These CSR can be edited, approved, and deleted. The RA can also generate the pair of cryptographic keys for smartcards, on behalf of the subscriber. The LDAP (Semersheim, 2006) interface is implemented to separate the management of the LDAP component from all

7 Bul. Inst. Polit. Iaşi, t. LVII (LXI), f. 3, other software components since not all LDAP functionalities are necessary all the time to PKI administrators. The Public interface in Fig. 1 represents the only interface available to PKI users. Some of the functionalities of this interface include: generation of the cryptographic pair and of the corresponding CSR (by means of various web browsers), handling of CSRs for servers in PKCS#10 format (Nystrom & Kaliski, 2000), certificate installation, CRL installation, certificate search, and certificate revocation. The Node interface is used for the database management and also for the data exchange between the different levels of the PKI hierarchy. Typical operations performed with this interface include database initialization, information back-up and recovery, and also synchronizing the data between different levels of the hierarchy. Another interesting component of OpenCA is the batch system (Welter, 2004). This automatizes the different processes taking place within the PKI reducing thus the chances for the end-users to make mistakes. The batch system is based on a finite state machine defining states, functions and flows. At each step, the automaton reads the user s configuration, verifies his status, computes the next function to be run and returns the execution result. The functionalities automatized by this system are: generation of the CSR, signing of the CSR, generation of a certificate revocation request (CRR) and revoking of certificates. The possible states and transitions of the system are depicted in Fig. 2: Fig. 2 States and transitions of the OpenCA batch system. Regarding the actual implementation, the OpenCA PKI solution does not have a monolithic structure. Instead it uses and relies on several open-source software products: The Apache HTTPD server used for accessing the application s components by admins and end-users. The webserver is configured to use the mod_ssl interface in order to provide strong cryptography for the

8 150 Marius Marian and Andrei Pîrvan communication; The OpenSSL cryptographic library, including its open-source implementation of the SSL/TLS protocol. All OpenCA cryptographic operations are using OpenSSL function calls; Perl programming language is used for writing the code of all OpenCA components; OpenLDAP, an open-source implementation of the LDAP protocol, necessary when LDAP is employed for distribution or storing of CRL and certificates; MySQL or PostgreSQL are two popular open-source database management systems. OpenCA must be configured to use one of them for storing the PKI data. Fig. 3 exemplifies the workflow of objects within the application. Essentially, it represents the typical operations of a PKI. Fig. 3 Flow of objects in OpenCA Setup and Administration For the implementation, we have chosen a hierarchical organization, using a root CA that will issue certificates only for the subordinated top-level CAs. The main reason for this is to allow for extension of the PKI (to other faculties of our university and even to other universities within the national education network), and also for a certain flexibility in the management of the PKI achieved via delegation of responsibility. The root CA is installed on an off-line workstation. On this same workstation is also installed the first subordinated CA (dedicated to the

9 Bul. Inst. Polit. Iaşi, t. LVII (LXI), f. 3, community of the Faculty of Automation, Computers and Electronics of the University of Craiova). This subordinated CA will handle certificates for the local community of subscribers (students and professors) and also for other entities (e.g. network devices, servers, etc.). On a second, on-line workstation, we have installed the public interface of the subordinated CA that will take care of all certificate signing requests (CSR) and all certificate revocation requests (CRR), plus the CRLs of the CAs. A scheme of the two installed PKI components is presented in Fig. 4. To manage the actual PKI implementation based on OpenCA, one may use one of the two available methods: either by means of the web interface or via direct editing of the configuration files. The web interface allows nevertheless access to the most frequent options used during the operation of a PKI. Furthermore, the team has contributed to the OpenCA project by providing a version of the solution in Romanian. The initial configuration of the components was made via file editing. These configuration files are all either in XML or in an OpenSSL-specific format. An optional component of a PKI is the OCSP responder (Myers et al., 1999) used throughout certificate validation. Instead of downloading during each certificate verification the entire CRL that may contain revocation information about all CA issued certificates and subsequently looking up within this list for a specific certificate, relying parties can query directly this OCSP responder for revocation status of individual certificates. Moreover, the OCSP responder may be providing fresher information than the static CRLs. In our implementation, we have installed a separate daemon for this protocol, the application being developed by the same OpenCA project. To operate the OCSP responder, it has to be configured with a special server certificate containing an extension that specifies to replying parties the capability of signing OCSP responses Performance The OpenCA PKI solution is based on OpenSSL (a widely-used cryptographic library available on-line at for all that concerns the cryptographic operations. Therefore, it makes sense to consider that the synthetic performance of the application will be similar to that of the crypto-library for these resource-consuming operations. From an end-user point of view, the delay in execution of crypto-ops is negligible, however for the administrators of the solution this may become of importance especially when working with large volumes of information. In the following test, we have used a notebook computer with 4 GB of RAM memory, and a Intel Core 2 Solo at 1.4 GHz running Debian Linux OS. The test was done for 100 users using the batch system provided by OpenCA. Running one process at a time, for every user in the list led to the values depicted in Table 1.

10 152 Marius Marian and Andrei Pîrvan Table 1 Testing OpenCA Performance Operation Average Time [min:sec] Create_pin 0:27 Check_pin 1:44 Check_key_params 0:09 Create_key 2:05 Check_key 1:45 Backup_key 2:05 Check_csr_params 0:09 Create_csr 2:03 Complete_csr 0:12 Check_csr 0:12 As mentioned earlier, the results are close to the performance of OpenSSL. For example, if the first operation (create_pin) were to be executed in shell using the appropriate OpenSSL commands would lead to a value of 23 seconds. However, the create_key operation which involves in the first place a set of several verifications and a PIN decryption before actually executing the intended operation, is run almost twice as fast in command line. We have found that the time spent on running the application perceived by the administrator is depending on the used hardware and grows linearly with the number of executed operations Problems Encountered The problems met during the setup and running of our PKI implementation are divided in two categories. The first category concerns the location. Up to this moment, there is not a fully-dedicated perimeter for the CA hardware within our faculty. The machines for the CA front-end and CA back-end are located within an enclosed perimeter in one of the faculty s laboratories. But the laboratory is frequented by a considerable number of students and faculty s employees that may represent a risk to the physical security of the machines. The laboratory is not endowed at this moment with an automatic system of alerting and reacting against fire. There are fire extinguishers in the room, but this requires human intervention in situ. The same applies to other natural hazards (i.e. earthquakes, flooding, etc.). The Certificate Policy and the associated Certification Practice Statement state that the CA infrastructure will recover as soon as possible after a natural hazard or a physical attack.

11 Bul. Inst. Polit. Iaşi, t. LVII (LXI), f. 3, Fig. 4 PKI installed components. The second class of problems concerns the software. There are three subcategories we have identified through the setup and deployment of the PKI solution: 1. Problems that were reported on the OpenCA mailing lists and which were solved by means of fixes and updates to the code. Here, we exemplify the internationalization problem and the patch for the Romanian language added to the application. 2. Problems that are still debated on the discussion forum and for which a solution has not yet been found. Here, an example is the use of the specific Romanian diacritics for the names of the subscribers. This is considered however a minor drawback given that the Romanian language in Internetrelated environments is still neither regulated nor used properly. 3. Problems that are not yet raised in the project forum, but for which a solution was identified. These problems and their solutions will be communicated directly to the development team of the OpenCA project. They mainly regard the incomplete translation of the various functions implemented in Perl and also the management of the assurance levels for the server certificates. 4. Future Activities One of the issues that will be tackled is the LDAP support in our PKI implementation. LDAP directories are meant to disseminate the public information of the PKI. Relying parties will be able via LDAP to search and download subscribers certificates before sending encrypted messages or verifying digital signatures. Additionally, certificate revocation lists can be also published here.

12 154 Marius Marian and Andrei Pîrvan Another activity will be to rectify the problem of using Romanian diacritics within digital certificates (mainly for the Distinguished Name field of a public-key certificate). A third activity will be the extension of the public-key infrastructure first to all personnel of the faculty and then to the other faculties within our university. Once the mass of subscribers will grow, we will be able to better approximate the performance of the solution. 5. Conclusions A pilot PKI based on OpenCA was implemented as part of the security infrastructure of the University of Craiova (ROCA Romanian Certification Authority available on-line at After the deployment we can confirm that public-key infrastructures are both useful and complex technologies, and require a large amount of time for building up the know-how. For an administrator to understand and customize OpenCA for a specific PKI implementation, she must cover multiple fields of expertise (e.g. programming, system administration, cryptography and information security, project management, etc.). Without a careful analysis and planning, it becomes difficult to find a way to alleviate its complexity and impact on end users and decision makers. Best practices concerning PKI can be derived from precedent and alternative experiences, and therefore they can help throughout the PKI setup and maintenance. Acknowledgments. This work was supported by the strategic grant POSDRU/89/1.5/S/61968, Project ID61968 (2009), co-financed by the European Social Fund within the Sectorial Operational Program Human Resources Development REFERENCES * * * Common Criteria for Information Technology Security Evaluation, Part. 1: Introduction and general model, version 2.1 (1999). * * * Common Criteria for Information Technology Security Evaluation, Part. 2: Security functional requirements, version 2.1 (1999). * * * Common Criteria for Information Technology Security Evaluation, Part. 3: Security assurance requirements, version 2.1 (1999). * * * Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures. * * * ITU-T Recommendation X.509, Information Technology, Open Systems Interconnection - The Directory: Public-key and attribute certificates frameworks (2005).

13 Bul. Inst. Polit. Iaşi, t. LVII (LXI), f. 3, * * * OpenCA guide, available on-line at openca-guide.pdf (2010). Myers M., Ankney R., Malpani A., Galperin S., Adams C., X.509 Internet Public Key Infrastructure Online Certificate Status Protocol (OCSP), IETF RFC 2560 (1999). Nystrom M., Kaliski B., Public Key Certificate Standard 10 (PKCS#10): Certification Request Syntax Specification, IETF RFC 2986 (2000). Oliver Welter, OpenCA Batch System, OpenCA workshop Semersheim J., Lightweight Directory Access Protocol (LDAP): The Protocol, IETF RFC4511 (2006). Shirey R., Internet Security Glossary. Internet Engineering Task Force Request for Comments (RFC) 2828 (2000). IMPLEMENTAREA UNEI INFRASTRUCTURI CU CHEIE PUBLICĂ PENTRU MEDIUL ACADEMIC (Rezumat) Lucrarea de fańă prezintă etapele de planificare, modelare, implementare şi testare ale unei infrastructuri de autentificare a utilizatorilor în cadrul mediului IT al unei instituńii de învăńământ superior din România. Infrastructurile cu cheie publică reprezintă instrumente puternice şi complexe care facilitează securitatea informatică. Fără o analiză atentă, o planificare judicioasă şi o implementare strictă a tuturor aspectelor ce privesc desfăşurarea în plan operańional a acestor instrumente, complexitatea acestor tehnologii şi impactul lor asupra utilizatorilor finali, precum şi a factorilor de decizie implicańi pot fi greu de asimilat, de utilizat şi în final, de acceptat. Lucrarea încearcă să sintetizeze experienńa căpătată şi bunele practici desprinse de autori pe parcursul punerii în funcńiune şi a menńinerii în operańie a acestei infrastructuri cu cheie publică.

A PKI approach targeting the provision of a minimum security level within Internet

A PKI approach targeting the provision of a minimum security level within Internet A PKI approach targeting the provision of a minimum security level within Internet Maryline Laurent-Maknavicius CNRS Samovar UMR 5157, GET/INT/LOR Maryline.Maknavicius@int-evry.fr Abstract After decades

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

Evaluation of Certificate Revocation in Microsoft Information Rights Management v1.0

Evaluation of Certificate Revocation in Microsoft Information Rights Management v1.0 Evaluation of Certificate Revocation in Microsoft Information Rights Management v1.0 Hong Zhou hzho021@ec.auckland.ac.nz for CompSci725SC, University of Auckland. 20 October 2006 Abstract Certificate revocation

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

A PKI ARCHITECTURE USING OPEN SOURCE SOFTWARE FOR E- GOVERNMENT SERVICES IN ROMANIA

A PKI ARCHITECTURE USING OPEN SOURCE SOFTWARE FOR E- GOVERNMENT SERVICES IN ROMANIA A PKI ARCHITECTURE USING OPEN SOURCE SOFTWARE FOR E- GOVERNMENT SERVICES IN ROMANIA NICUȘOR VATRA The Doctoral School Department, The Bucharest Academy of Economic Studies, 6, Romana Square, district 1

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a

More information

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler Certificates Noah Zani, Tim Strasser, Andrés Baumeler Overview Motivation Introduction Public Key Infrastructure (PKI) Economic Aspects Motivation Need for secure, trusted communication Growing certificate

More information

HKUST CA. Certification Practice Statement

HKUST CA. Certification Practice Statement HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of

More information

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates

More information

CERTIFICATION PRACTICE STATEMENT UPDATE

CERTIFICATION PRACTICE STATEMENT UPDATE CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.

More information

Ericsson Group Certificate Value Statement - 2013

Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

prefer to maintain their own Certification Authority (CA) system simply because they don t trust an external organization to

prefer to maintain their own Certification Authority (CA) system simply because they don t trust an external organization to If you are looking for more control of your public key infrastructure, try the powerful Dogtag certificate system. BY THORSTEN SCHERF symmetric cryptography provides a powerful and convenient means for

More information

ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0

ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0 ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0 June 30, 2004 Table of Contents Table of Contents...2 1 Introduction...3 1.1 Overview...3 1.1.1 General Definitions...4

More information

An Introduction to Entrust PKI. Last updated: September 14, 2004

An Introduction to Entrust PKI. Last updated: September 14, 2004 An Introduction to Entrust PKI Last updated: September 14, 2004 2004 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

More information

Key Management and Distribution

Key Management and Distribution Key Management and Distribution Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu udio/video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

- X.509 PKI EMAIL SECURITY GATEWAY. Certificate Policy (CP) & Certification Practice Statement (CPS) Edition 1.1

- X.509 PKI EMAIL SECURITY GATEWAY. Certificate Policy (CP) & Certification Practice Statement (CPS) Edition 1.1 - X.509 PKI EMAIL SECURITY GATEWAY Certificate Policy (CP) & Certification Practice Statement (CPS) Edition 1.1 Commerzbank AG - Page 1 Document control: Title: Description : RFC Schema: Authors: Commerzbank

More information

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part III-a Contents Part III-a Public-Key Infrastructure (PKI) Definition of a PKI and PKI components PKI Trust Models Digital Certificate, X.509 Certificate Management and Life Cycle Public Key Infrastructure

More information

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1 PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority

More information

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc. Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.

More information

An introduction to EJBCA and SignServer

An introduction to EJBCA and SignServer An introduction to EJBCA and SignServer PrimeKey Solutions AB Tomas Gustavsson http://www.primekey.se tomas@primekey.se EJBCA and SignServer Euro PKI projects and use cases 1 EJBCA - Open Source Enterprise

More information

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Configuring Digital Certificates

Configuring Digital Certificates CHAPTER 36 This chapter describes how to configure digital certificates and includes the following sections: Information About Digital Certificates, page 36-1 Licensing Requirements for Digital Certificates,

More information

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Certificate Management. PAN-OS Administrator s Guide. Version 7.0 Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Certification Practice Statement

Certification Practice Statement FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification

More information

Introduction to Network Security Key Management and Distribution

Introduction to Network Security Key Management and Distribution Introduction to Network Security Key Management and Distribution Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology cetinkayae@mst.edu http://web.mst.edu/~cetinkayae/teaching/cpe5420fall2015

More information

Key Management and Distribution

Key Management and Distribution Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/

More information

Certificate technology on Pulse Secure Access

Certificate technology on Pulse Secure Access Certificate technology on Pulse Secure Access How-to Guide Published Date July 2015 Contents Introduction: 3 Creating a Certificate signing request (CSR): 3 Import Intermediate CAs: 5 Using Trusted Client

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

Certificate technology on Junos Pulse Secure Access

Certificate technology on Junos Pulse Secure Access Certificate technology on Junos Pulse Secure Access How-to Introduction:... 1 Creating a Certificate signing request (CSR):... 1 Import Intermediate CAs: 3 Using Trusted Client CA on Juno Pulse Secure

More information

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with

More information

Government CA Government AA. Certification Practice Statement

Government CA Government AA. Certification Practice Statement PKI Belgium Government CA Government AA Certification Practice Statement 2.16.56.1.1.1.3 2.16.56.1.1.1.3.2 2.16.56.1.1.1.3.3 2.16.56.1.1.1.3.4 2.16.56.1.1.1.6 2.16.56.1.1.1.6.2 2.16.56.9.1.1.3 2.16.56.9.1.1.3.2

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

Securing Service Access with Digital Certificates

Securing Service Access with Digital Certificates Securing Service Access with Digital Certificates Jovana Palibrk, AMRES NA3 T2, Tbilisi, December 2013. Agenda Theory Cryptographic Protocols and Techniques Public Key Infrastructure TERENA Certificate

More information

Why Digital Certificates Are Essential for Managing Mobile Devices

Why Digital Certificates Are Essential for Managing Mobile Devices WHITE PAPER: WHY CERTIFICATES ARE ESSENTIAL FOR MANAGING........... MOBILE....... DEVICES...................... Why Digital Certificates Are Essential for Managing Mobile Devices Who should read this paper

More information

UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION

UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION Foreword. Preface. About the Authors. I. CONCEPTS. 1. Introduction. 2. Public-Key Cryptography. Symmetric versus Asymmetric

More information

Security Goals Services

Security Goals Services 1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;

More information

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006 Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark

More information

PostSignum CA Certification Policy applicable to qualified personal certificates

PostSignum CA Certification Policy applicable to qualified personal certificates PostSignum CA Certification Policy applicable to qualified personal certificates Version 3.0 7565 Page 1/60 TABLE OF CONTENTS 1 Introduction... 5 1.1 Review... 5 1.2 Name and clear specification of a document...

More information

Security Policy Revision Date: 23 April 2009

Security Policy Revision Date: 23 April 2009 Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure

More information

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc. Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.8 Effective Date: June 11, 2012 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2.

More information

Asymmetric cryptosystems fundamental problem: authentication of public keys

Asymmetric cryptosystems fundamental problem: authentication of public keys Network security Part 2: protocols and systems (a) Authentication of public keys Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Asymmetric cryptosystems fundamental

More information

PKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc. 08.11.2013

PKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc. 08.11.2013 2013 PKI Made Easy: Managing Certificates with Dogtag Ade Lee Sr. Software Engineer Red Hat, Inc. 08.11.2013 Agenda What is PKI? What is Dogtag? Installing Dogtag Interacting with Dogtag using REST Future

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

Grid Computing - X.509

Grid Computing - X.509 Grid Computing - X.509 Sylva Girtelschmid October 20, 2009 Public Key Infrastructure - PKI PKI Digital Certificates IT infrastructure that provides means for private and secure data exchange By using cryptographic

More information

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure Expert Reference Series of White Papers Fundamentals of the PKI Infrastructure 1-800-COURSES www.globalknowledge.com Fundamentals of the PKI Infrastructure Boris Gigovic, Global Knowledge Instructor, CEI,

More information

Understanding digital certificates

Understanding digital certificates Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH mickobrien137@hotmail.co.uk, george.weir@cis.strath.ac.uk

More information

Danske Bank Group Certificate Policy

Danske Bank Group Certificate Policy Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...

More information

Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI) Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure

More information

Qatar Ministry of Interior - Public Key Infrastructure Certificate Policy

Qatar Ministry of Interior - Public Key Infrastructure Certificate Policy Qatar Ministry of Interior - Public Key Infrastructure Certificate Policy Issue : 1.2 Issue date : 19 October 2014 Status : Approved page 1 of 58 Amendment history Date Issue Status Changes Author 27/08/2014

More information

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION I. DEFINITIONS For the purpose of this Service Description, capitalized terms have the meaning defined herein. All other capitalized

More information

7 Key Management and PKIs

7 Key Management and PKIs CA4005: CRYPTOGRAPHY AND SECURITY PROTOCOLS 1 7 Key Management and PKIs 7.1 Key Management Key Management For any use of cryptography, keys must be handled correctly. Symmetric keys must be kept secret.

More information

Public-Key Infrastructure

Public-Key Infrastructure Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards

More information

encryption keys, signing keys are not archived, reducing exposure to unauthorized access to the private key.

encryption keys, signing keys are not archived, reducing exposure to unauthorized access to the private key. The way the world does business is changing, and corporate security must change accordingly. For instance, e-mail now carries not only memos and notes, but also contracts and sensitive financial information.

More information

Djigzo email encryption. Djigzo white paper

Djigzo email encryption. Djigzo white paper Djigzo email encryption Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or

More information

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and operation of secure remote access infrastructures Central creation of client configuration

More information

Number of relevant issues

Number of relevant issues Electronic signature Lecture 8 Number of relevant issues cryptography itself algorithms for signing documents key management generating keys, distribution, key revocation security policy certificates may

More information

Validity Models of Electronic Signatures and their Enforcement in Practice

Validity Models of Electronic Signatures and their Enforcement in Practice Validity Models of Electronic Signatures and their Enforcement in Practice Harald Baier 1 and Vangelis Karatsiolis 2 1 Darmstadt University of Applied Sciences and Center for Advanced Security Research

More information

CERTIFICATE POLICY KEYNECTIS SSL CA

CERTIFICATE POLICY KEYNECTIS SSL CA CERTIFICATE POLICY KEYNECTIS SSL CA Date: 05/02/2009 KEYNECTIS SSL CA CERTIFICATE POLICY Subject: KEYNECTIS SSL CA Certificate Policy Version number: 1.1 Number of pages: 49 Status of the Project Final

More information

Security + Certification (ITSY 1076) Syllabus

Security + Certification (ITSY 1076) Syllabus Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and

More information

X.509 Certificate Revisited

X.509 Certificate Revisited X.509 Certificate Revisited Tohari Ahmad Informatics Department, Faculty of Information Technology - FTIF, ITS Surabaya Email: tohari@its-sby.edu Abstract A digital certificate is used for identifying

More information

CMS Illinois Department of Central Management Services

CMS Illinois Department of Central Management Services CMS Illinois Department of Central Management Services State of Illinois Public Key Infrastructure Certification Practices Statement For Digital Signature And Encryption Applications Version 3.3 (IETF

More information

Secure Web Access Solution

Secure Web Access Solution Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...

More information

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT

More information

DJIGZO EMAIL ENCRYPTION. Djigzo white paper

DJIGZO EMAIL ENCRYPTION. Djigzo white paper DJIGZO EMAIL ENCRYPTION Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or

More information

phicert Direct Certificate Policy and Certification Practices Statement

phicert Direct Certificate Policy and Certification Practices Statement phicert Direct Certificate Policy and Certification Practices Statement Version 1. 1 Effective Date: March 31, 2014 Copyright 2013-2014 EMR Direct. All rights reserved. [Trademark Notices] phicert is a

More information

CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper

CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in

More information

L@Wtrust Class 3 Registration Authority Charter

L@Wtrust Class 3 Registration Authority Charter Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12

More information

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate

More information

Equens Certificate Policy

Equens Certificate Policy Equens Certificate Policy WebServices and Connectivity Final H.C. van der Wijck 11 March 2015 Classification: Open Version 3.0 Version history Version no. Version date Status Edited by Most important edit(s)

More information

Certification Practice Statement

Certification Practice Statement Certification Practice Statement Revision R1 2013-01-09 1 Copyright Printed: January 9, 2013 This work is the intellectual property of Salzburger Banken Software. Reproduction and distribution require

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology Centrally Managed VPN fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and

More information

Authentication Applications

Authentication Applications Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos a private-key authentication service

More information

Certificate Policy KEYNECTIS SSL CA CP. Emmanuel Montacutelli 12/11/2014 DMS_CP_KEYNECTIS SSL CA CP_1.2

Certificate Policy KEYNECTIS SSL CA CP. Emmanuel Montacutelli 12/11/2014 DMS_CP_KEYNECTIS SSL CA CP_1.2 Certificate Policy KEYNECTIS SSL CA CP Emmanuel Montacutelli 12/11/2014 DMS_CP_KEYNECTIS SSL CA CP_1.2 KEYNECTIS SSL CA CP Version 1.2 Pages 51 Status Draft Final Author Emmanuel Montacutelli OpenTrust

More information

Internal Server Names and IP Address Requirements for SSL:

Internal Server Names and IP Address Requirements for SSL: Internal Server Names and IP Address Requirements for SSL: Guidance on the Deprecation of Internal Server Names and Reserved IP Addresses provided by the CA/Browser Forum June 2012, Version 1.0 Introduction

More information

Neutralus Certification Practices Statement

Neutralus Certification Practices Statement Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3

More information

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 11: Active Directory Certificate Services Objectives Describe the components of a PKI system Deploy the Active Directory

More information

X.509 Certificate Generator User Manual

X.509 Certificate Generator User Manual X.509 Certificate Generator User Manual Introduction X.509 Certificate Generator is a tool that allows you to generate digital certificates in PFX format, on Microsoft Certificate Store or directly on

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN Title INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456 Customer Aristotle University of Thessaloniki PKI (www.pki.auth.gr) To WHOM IT MAY CONCERN Date 18 March 2011 Independent Audit

More information

Public Key Infrastructure

Public Key Infrastructure UT DALLAS Erik Jonsson School of Engineering & Computer Science Public Key Infrastructure Murat Kantarcioglu What is PKI How to ensure the authenticity of public keys How can Alice be sure that Bob s purported

More information

associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.

associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys. Foundations for secure e-commerce (bmevihim219) Dr. Levente Buttyán associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.hu

More information

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in

More information

Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Terminology in PKIs. Chain of Certificates

Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Terminology in PKIs. Chain of Certificates Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Purpose, Methods, Revocation, PKIX To distribute public keys securely Requires - Certificates and Certification Authorities - Method for retrieving certificates

More information

IBM i Version 7.3. Security Digital Certificate Manager IBM

IBM i Version 7.3. Security Digital Certificate Manager IBM IBM i Version 7.3 Security Digital Certificate Manager IBM IBM i Version 7.3 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. July 2011 Version 2.0. Copyright 2006-2011, The Walt Disney Company

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. July 2011 Version 2.0. Copyright 2006-2011, The Walt Disney Company THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY July 2011 Version 2.0 Copyright 2006-2011, The Walt Disney Company Version Control Version Revision Date Revision Description Revised

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1 Chapter 15 Key Management Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1 Symmetric-key Distribution Symmetric-key cryptography is more efficient than asymmetric-key

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network. Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components

More information

Entrust Managed Services PKI

Entrust Managed Services PKI Entrust Managed Services PKI Entrust Managed Services PKI Windows Smart Card Logon Configuration Guide Using Web-based applications Document issue: 1.0 Date of Issue: June 2009 Copyright 2009 Entrust.

More information

REGISTRATION AUTHORITY (RA) POLICY. Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A.

REGISTRATION AUTHORITY (RA) POLICY. Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. REGISTRATION AUTHORITY (RA) POLICY Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. INDEX Contenido 1. LEGAL FRAMEWORK... 4 1.1. Legal Base...

More information

Chapter 7 Managing Users, Authentication, and Certificates

Chapter 7 Managing Users, Authentication, and Certificates Chapter 7 Managing Users, Authentication, and Certificates This chapter contains the following sections: Adding Authentication Domains, Groups, and Users Managing Certificates Adding Authentication Domains,

More information

Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr

Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr Version 0.3 August 2002 Online : http://www.urec.cnrs.fr/igc/doc/datagrid-fr.policy.pdf Old versions Version 0.2 :

More information

Visa Public Key Infrastructure Certificate Policy (CP)

Visa Public Key Infrastructure Certificate Policy (CP) Visa Public Key Infrastructure Certificate Policy (CP) Version 1.7 Effective: 24 January 2013 2010-2013 Visa. All Rights Reserved. Visa Public Important Note on Confidentiality and Copyright The Visa Confidential

More information