Overview of DFN`s Certificate Services - Regular, Grid and short-lived -
|
|
|
- Patricia Fitzgerald
- 10 years ago
- Views:
Transcription
1 Overview of DFN`s Certificate Services - Regular, Grid and short-lived - Marcus Pattloch (DFN-Verein) DESY Computing Seminar 13. July 2009, Hamburg
2 Overview Certificates what are they good for (and what not)? Regular Certificates what (almost) everyone needs Grid Certificates why another hierarchy? Short-lived Certificates (SLCS) shibboleth, DFN-AAI, identity management Conclusions Seite 2
3 Certificates Seite 3
4 What is a certificate? Certificate = digital identity card for use on the internet Once I have a certificate and use it in electronic communication, everyone can prove that I am who I claim to be E.g. on a chipcard (but: not every chipcard contains a certificate) Marcus Pattloch Seite 4
5 Use of certificates Confidentiality encryption of documents and s Signature signing.pdf documents signing s creating time stamps on documents Authentication (not authorization!!) server identification (SSL, https) ID for access to protected websites ID for access to databases etc. (ssh, IPsec) Seite 5
6 Digital identity card my private key & my personal data Marcus Pattloch An infrastructure is needed to guarantee the link between the private key and the personal data. This is done by a public key infrastructure (PKI) Seite 6
7 What is a PKI? A PKI is an infrastructure generating certificates and consisting of the following main components Registration Authorities (RA) Certification Authorities (CA) Policies Directory Service for certificates (PKI-aware applications) Seite 7
8 Splitting tasks makes it much easier Registration Authority administrative tasks done on site Certification Authority technically demanding tasks organisationally demanding tasks operated by DFN for all (!) sites Seite 8
9 Hierarchy of CAs DFN-PCA Univ. of Hamburg CA DESY CA... Certification Authority n Person A... Server B Person C... Server D Person X Seite 9
10 List of DFN-PKI participants Seite 10
11 Mozilla and certificates Very useful add-on for Mozilla Firefox and Thunderbird Cert Viewer Plus 1.5 by Kaspar Brand (Switch - Swiss research network) extension of menue improved saving and viewing of certificates Seite 11
12 Regular Certificates Seite 12
13 Regular certificates Regular (non-grid) certificates are what most people need Validity of certificates server certificates max. 5 years user certificates max. 3 years CA certificate max. 12 years Certificates are linked into standard webbrowsers, i.e. no pop-up boxes from webservers signatures can automatically be verified Seite 13
14 Status of integration Status of integration of Telekom Root CA2, thus also of root of DFN-PKI Global Windows: all desktop versions (2k, XP, Vista, 7) Apple: since June 2008 (OS X, ipod, iphone) Opera: since 2008 Mozilla: since Firefox 3.5, Thunderbird 3.0 Sun Java: since V6u11 (11.08) Google Chrome: yes, independent of OS All details about integration: Seite 14
15 Demo: Obtaining a regular certificate Seite 15
16 Summary: Regular certificates More than 250 sites in Germany have a CA within DFN-PKI More than valid certificates issued Regular certificates do the job and are what everyone needs but there is one exception... Seite 16
17 Grid Certificates Seite 17
18 Accessing resources in D-Grid (1) Within a VO no (grid) certificates necessary TextGrid BauVOGrid AstroGrid Seite 18
19 Accessing resources in D-Grid (2) More than 25 other D-Grid projects! TextGrid BauVOGrid AstroGrid Seite 19
20 Grid PMAs To deal with certificates in grids a new body was set-up by grid / HEP people European Grid Policy Management Authority (EUGridPMA) definition of policies and procedures for (worldwide) use of grid certificates International Grid Trust Federation IGTF EUGridPMA Asia Pacific PMA The Americas PMA Seite 20
21 Grid certificates in Germany DFN Grid CA (DFN-Verein) and GridKA CA (FZ Karlsruhe) are both accredited to EUGridPMA DFN Grid CA GridKA CA C= DE C= DE O= GridGermany O= GermanGrid OU= site name OU= site name [OU] = e.g. name of division CN= given name surname CN= given name surname [hostname/service] [hostname/service] Seite 21
22 Obtaining a grid certificate Seite 22
23 Regular vs. grid certificates Why not just use regular certificates in grids? technically no difference (both based on X.509) But grid certificates have to follow some strange rules, e.g. basically just one CA per country no sub-cas thus no CA-hierarchies very short validity of certificates (max. 13 months) Strange rules for grid certificates force users to have more than just one certificate hard to see a practical reason for this... Seite 23
24 Status quo Issuing grid certificates in D-Grid works Number of issued certificates is much smaller than in the regular world Users complain that they need different certificates that they have to obtain a new grid certificate every 12 month The question remains whether current grid certificates are the perfect solution... Seite 24
25 Certificates in D-Grid Documents about certificates in D-Grid Authentifizierung im D-Grid ( ) Split between authentication and authorization Registration authorities (RAs) per site, not for dynamic structures like projects or VOs Non-academic partners can basically be served by every RA Verwendung von Zertifikaten im D-Grid (3.2008) New types of Grid certificates possible (SLCS, Robotcertificates for use in portals) All D-Grid certificates require face-to-face identification of subscribers (= someone who wants a certificate) Seite 25
26 Short-lived Certificates Seite 26
27 SLCS (1) Some grid users don t want to have a certificate at all but: use of grid middleware is only possible with certificates Idea for new type of grid certificates was born SLCS (Short Lived Credential Services) idea: create short-lived certificate on-the-fly using standard user credentials (userid, password) this should make everything much easier, but... Seite 27
28 SLCS (2) Security requirements for SLCS are as high as for grid certificates e.g. face-to-face identification of subscribers This results in an even more complicated basic infrastructure GridShib software Shibboleth based authentication / authorization infrastructure (DFN-AAI) identity management system in place, data must be updated regularly Seite 28
29 Live Demo: SLCS Certificate Seite 29
30 SLCS architecture for portals Seite 30
31 Conclusions Seite 31
32 Conclusions DFN offers different kinds of certificates regular, grid, SLCS share of regular certificates is around 98% (!) but for the time being grid users need at least two certificates Obtaining a certificate is quite easy since more than 250 sites take part in DFN-PKI More information [email protected] Seite 32
The InCommon Certificate Service FAQ This document subject to change as elements of the program are refined.
The InCommon Certificate Service FAQ InCommon is an LLC of Internet2 October 13, 2010 This document subject to change as elements of the program are refined. 1. What is the InCommon Certificate Program?
Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM)
Reading an email sent with Voltage SecureMail Using the Voltage SecureMail Zero Download Messenger (ZDM) SecureMail is an email protection service developed by Voltage Security, Inc. that provides email
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
VPN: Virtual Private Network Setup Instructions
VPN: Virtual Private Network Setup Instructions Virtual Private Network (VPN): For e-journals and web-based databases, plus applications like EndNote's Online Search (formerly "Connect") and business systems.
Securing ArcGIS Server Services: First Steps
Federal GIS Conference February 9 10, 2015 Washington, DC Securing ArcGIS Server Services: First Steps Michael Sarhan Esri [email protected] Agenda Review Basic Security Workflow ArcGIS Server Roles and
Campus VPN. Version 1.0 September 22, 2008
Campus VPN Version 1.0 September 22, 2008 University of North Texas 1 9/22/2008 Introduction This is a guide on the different ways to connect to the University of North Texas Campus VPN. There are several
Flexible Identity Federation
Flexible Identity Federation User guide version 1.0.1 Publication History Date Description Revision 2015.09.25 initial release 1.0.0 2015.12.10 minor corrections 1.0.1 Copyright Orange Business Services
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...
Sophos UTM. Remote Access via PPTP Configuring Remote Client
Sophos UTM Remote Access via PPTP Configuring Remote Client Product version: 9.300 Document date: Tuesday, October 14, 2014 The specifications and information in this document are subject to change without
This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network.
This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network. Prerequisites for Network Registration: 1. In order to
6. Is it mandatory to have the digital certificate issued from NICCA?...3. 7. Is it mandatory for the sender and receiver to have a NIC email id?...
FAQ FOR S/MIME 1. What is S/MIME?...2 2. What is digital certificate?...2 3. What is an encrypted email?...2 4. Is it mandatory to use this service?...2 5. What I need to do to start using S/MIME service?...2
Portal Recipient Guide
Portal Recipient Guide Lindenhouse Software Limited 2015 Contents 1 Introduction... 4 2 Account Activation... 4 3 Forgotten Password... 9 4 Document signing... 12 5 Authenticating your Device & Browser...
Secure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
PKI: Public Key Infrastructure
PKI: Public Key Infrastructure What is it, and why should I care? Conference on Higher Education Computing in Kansas June 3, 2004 Wes Hubert Information Services The University of Kansas Why? PKI adoption
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Website Administration Security Guide
Website Administration Security Guide September 2012 TABLE OF CONTENTS Introduction... 1 General Overview... 1 System Requirements... 1 Important Administrator Terms... 2 Security Services Administration...
Access Your Cisco Smart Storage Remotely Via WebDAV
Application Note Access Your Cisco Smart Storage Remotely Via WebDAV WebDAV (Web-based Distributed Authoring and Versioning), is a set of extensions to the HTTP(S) protocol that allows a web server to
Remember, this is not specific to your email address alone... the METHOD you retrieve your email is equally important.
Securing Your Email Skip to Page 2 to Begin or Read this FYI Using Security Certificates: Background and FYI Securing email requires the use of a certificate in order to work. Once you sign up for a certificate
VPN Web Portal Usage Guide
VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET
Personal Secure Email Certificate
Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Software version: 10.5 Date of Issue: May 2012 Document issue: 1.0 Copyright 2010-2012 Entrust. All rights reserved. Entrust
Personal Secure Email Certificate
Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Date of Issue: October 2010 Copyright 2010 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
Australian Synchrotron, Storage Gateway
Australian Synchrotron, Storage Gateway User Help Manual Version 1.2 Storage Gateway User Help Manual 2 REVISION HISTORY Date Version Description Author 2 May 2008 1.0 Document creation Chris Myers 13
Technical notes for HIGHSEC eid App Middleware
Technical notes for HIGHSEC eid App Middleware Version 2.1 February 2014. 1 Contents 1 Technical Notes... 3 1.1 All Operating Systems... 3 1.1.1 Slowing down of the cards while pairing... 3 1.1.2 Load
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
Sophos Mobile Control Installation guide
Sophos Mobile Control Installation guide Product version: 2.5 Document date: July 2012 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Running
SAS Visual Analytics 7.2 for SAS Cloud: Quick-Start Guide
SAS Visual Analytics 7.2 for SAS Cloud: Quick-Start Guide Introduction This quick-start guide covers tasks that account administrators need to perform to set up SAS Visual Statistics and SAS Visual Analytics
Sophos UTM. Remote Access via IPsec Configuring Remote Client
Sophos UTM Remote Access via IPsec Configuring Remote Client Product version: 9.300 Document date: Tuesday, October 14, 2014 The specifications and information in this document are subject to change without
eduroam wireless setup guide for Windows 7, XP and Vista
Information Technology Services eduroam wireless setup guide for Windows 7, XP and Vista Configuring Windows to connect to the eduroam wireless network June 2011 Introduction This document describes how
Entrust Managed Services PKI Administrator s Quick Start Guide
Entrust Managed Services PKI Administrator s Quick Start Guide Each Managed Services PKI organization requires an administrator also known as a local registration authority (LRA) whose duty it is to manage
Remote Access End User Reference Guide for SHC Portal Access
Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required
GlobalSign Integration Guide
GlobalSign Integration Guide GlobalSign Enterprise PKI (EPKI) and AirWatch Enterprise MDM 1 v.1.1 Table of Contents Table of Contents... 2 Introduction... 3 GlobalSign Enterprise PKI (EPKI)... 3 Partner
Grid Computing - X.509
Grid Computing - X.509 Sylva Girtelschmid October 20, 2009 Public Key Infrastructure - PKI PKI Digital Certificates IT infrastructure that provides means for private and secure data exchange By using cryptographic
Recommended Browser Setting for MySBU Portal
The MySBU portal is built using Microsoft s SharePoint technology framework, therefore, for the best viewing experience, Southwest Baptist University recommends the use of Microsoft s Internet Explorer,
Certificates for computers, Web servers, and Web browser users
Entrust Managed Services PKI Certificates for computers, Web servers, and Web browser users Document issue: 3.0 Date of issue: June 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
Web Manual: Email September 2014
Table of Contents Getting Started... 3 How to change your password... 3 How to Access Division Email... 4 Outlook Web App (Webmail)... 4 iphone... 4 Android... 4 Blackberry... 4 Outlook Anywhere (MS Outlook)
How do I start a meeting?
join.me FAQ How do I start a meeting? of 1 https://join.me/welcome/webhelp/joinme/join.me/jm_faq_start.html#top... 9/18/2012 10:52 AM > How do I start a meeting? On a PC or Mac, go to the join.me website
Web Conferencing Version 8.3 Troubleshooting Guide
System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which
Alberni Valley IT Services http://www.avits.ca [email protected]. Virtual domain E-mail information.
Alberni Valley IT Services http://www.avits.ca [email protected] Virtual domain E-mail information. Welcome! This document outlines information necessary for you to send and receive E-mail for your virtual
Ciphermail for BlackBerry Quick Start Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail for BlackBerry Quick Start Guide June 19, 2014, Rev: 8975 Copyright 2010-2014, ciphermail.com. Introduction This guide will explain how to setup and configure a Ciphermail
FAQS. You can schedule a WebEx session ahead or start it instantly in your choice of ways:
FAQS What is WebEx? WebEx is an easy way to exchange ideas and information with anyone, anywhere. It combines real-time desktop sharing with phone conferencing, so everyone sees the same thing as you talk.
Wavecrest Certificate
Wavecrest InstallationGuide Wavecrest Certificate www.wavecrest.net Copyright Copyright 1996-2015, Wavecrest Computing, Inc. All rights reserved. Use of this product and this manual is subject to license.
SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2
SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 Table of Contents 1 Introduction...2 2 Procurement of DSC...3 3 Installation of DSC...4 4 Procedure for entering the DSC details of
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of
Djigzo S/MIME setup guide
Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7
DFN-Services - what is the benefit for large scientific collaborations?
DFN-Services - what is the benefit for large scientific collaborations? Karin Schauerhammer, [email protected] Klaus Ullmann, [email protected] 01.02.2010, DESY Hamburg Seite 1 Contents Large scientific collaborations
Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
EURECOM VPN SSL for students User s guide
EURECOM VPN SSL for students User s guide Table of Contents Introduction... 2 Login process... 2 Portail main page... 2 Prerequisite... 2 RSA SecurId software token... 3 First usage of RSA SecurID token...
Tidspunkt 18-08-2015 11:58 01-07-2015 00:00-18-08-2015 23:59 (49 dag(e)) Operativsystem (OS) fordelt på browsere Total: 267852. Safari9 ios 7921 100%
Indstillinger Tidspunkt 18-08-2015 11:58 Periode 01-07-2015 00:00-18-08-2015 23:59 (49 dag(e)) Operativsystem (OS) fordelt på browsere Total: 267852 Safari9 ios 7921 100% MAC OS X 1 0% Safari8 ios 572
Remote Access Services Microsoft Windows - Installation Guide
Remote Access Services Microsoft Windows - Installation Guide Version 3.1 February 23, 2015 1 P age Contents GETTING STARTED... 3 JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... 3 Windows XP... 3
Web Manual: Email October 2015
Table of Contents Getting Started... 3 How to change your password... 3 How to Access Division Email... 4 Outlook Web App (Webmail)... 4 iphone... 4 Android... 4 Blackberry... 4 Outlook Anywhere (MS Outlook)
What security and assurance standards does Trustis use for TMDCS certificate services?
Frequently Asked Questions What is a Digital Certificate? What is a Root Certificate? How do Digital Certificates Work? Who needs a Digital Certificate? How do I get a Digital Certificate Can I use my
How To Sync Google Drive On A Mac Computer With A Gmail Account On A Gcd (For A Student) On A Pc Or Mac Or Mac (For An Older Person) On An Ipad Or Ipad (For Older People) On
Installation and Setup of Google Drive for Students on Mac OS X Purpose: This guide will lead you through the Google Drive Installation and Configuration. Pre-requisites: 1) ODU Student Gmail account 2)
How To Login To Webex Online
Getting Prepared for Your Online Course! This document will let you know what to expect and walk you through a Test Login One of our top priorities is to meet your demand for high quality, easy to use,
Accessing UniSIM MyMail For Students and Associates Via Microsoft Office 365. UniSIM - Restricted
Accessing UniSIM MyMail For Students and Associates Via Microsoft Office 365 Disclaimer This guide is a generic guide of accessing UniSIM MyMail for Students and Associates via Microsoft Office 365. UniSIM
National Certification Authority Framework in Sri Lanka
National Certification Authority Framework in Sri Lanka By Rohana Palliyaguru Manager Operations & Principal Information Security Engineer What is digital Signature? According to UNCITRAL Text 25. Digital
How To Make A Trustless Certificate Authority Secure
Network Security: Public Key Infrastructure Guevara Noubir Northeastern University [email protected] Network Security Slides adapted from Radia Perlman s slides Key Distribution - Secret Keys What if
Sophos UTM. Remote Access via SSL Configuring Remote Client
Sophos UTM Remote Access via SSL Configuring Remote Client Product version: 9.300 Document date: Tuesday, October 14, 2014 The specifications and information in this document are subject to change without
Digital Signature Certificate Online Enrollment Guide using etoken
Digital Signature Certificate Online Enrollment Guide using etoken C O N T A C T U S [email protected] http://www.tcs-ca.tcs.com 1. A B O U T T H E D O C U M E N T This document describes the procedure
L@Wtrust Class 3 Registration Authority Charter
Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12
Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6)
Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6) Content Page Introduction 2 Platform support 2 Cross Platform support 2 Web and file browsing 2 Client-side Applets
Mail Programs. Manual
Manual April 2015, Copyright Webland AG 2015 Table of Contents Introduction Basics Server Information SSL POP3 IMAP Instructions Windows Outlook 2000 Outlook 2002/2003/XP Outlook 2007 Outlook 2010 Outlook
Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1
PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority
Recommended operating systems and software for end user services. Operating systems and software not supported for end user services
Recommended operating systems and software for end user services There are different requirements for different features in Office 365 Beta Beta, but the following list will work with every feature: Windows
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise
Middleware integration in the Sympa mailing list software. Olivier Salaün - CRU
Middleware integration in the Sympa mailing list software Olivier Salaün - CRU 1. Sympa, its middleware connectors 2. Sympa web authentication 3. CAS authentication 4. Shibboleth authentication 5. Sympa
User Documentation. Available Services 1. Quick Links 1. External Links 1. Logging on/off 2...3. Changing your password 3
User Documentation Introduction 1 Available Services 1 Quick Links 1 External Links 1 Browser Compatibility 2 Logging on/off 2...3 Changing your password 3 Changing your security questions and answers
Bugzilla ID: Bugzilla Summary:
Bugzilla ID: Bugzilla Summary: CAs wishing to have their certificates included in Mozilla products must 1) Comply with the requirements of the Mozilla CA certificate policy (http://www.mozilla.org/projects/security/certs/policy/)
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required
Using the FDO Remote Access Portal
Using the FDO Remote Access Portal Introduction The ODS NITOAD Branch has implemented a Juniper Networks secure sockets layer (SSL) virtual private network (VPN) solution at the national gateways to provide
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Sophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
How to use Mints@Home
How to use Mints@Home Citrix Remote Access gives Mints users the ability to access University Of Cambridge and MINTS resources from any computer, anywhere in the world,. The service requires a high-speed
Sophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
How to configure your Desktop Computer and Mobile Devices post migrating to Microsoft Office 365
How to configure your Desktop Computer and Mobile Devices post migrating to Microsoft Office 365 1 Contents Purpose... 3 Office 365 Mail Connections... 3 Finding IMAP server... 3 Desktop computers... 4
How To Configure Email Using Different Email Clients
How To Configure Email Using Different Email Clients This document will show step by step instructions for setting up and updating email accounts using different Email Clients. Always remember to verify
8x8 Click2Pop User Guide
USER GUIDE 8x8 User Guide Getting Started with April 2014 Contents Introduction... 3 What s new.... 3 8x8.... 3 Here is how works...4 8x8 Click2Connect.... 4 Requirements.... 4 Installation on Microsoft
CSC E Mail. Mobile Device Configuration Settings and Setup Instructions
CSC E Mail Mobile Device Configuration Settings and Setup Instructions Contents Overview... 3 Android (Droid, Google Android, etc.)... 4 Exchange Settings... 4... 4 RIM Blackberry... 5... 5 Apple iphone
To participate in the hands-on labs in this class, you need to bring a laptop computer with the following:
Course: Deploying Cisco ASA VPN Solutions Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Learning Credits: 35 Description: The Deploying Cisco ASA VPN Solutions (VPN) v2.0 course is a
Setting up secure e-mail communication with Ericsson. Guideline for Ericsson partners
Setting up secure e-mail communication with Ericsson Guideline for Ericsson partners In this presentation Introduction Technical prerequisites Getting started Exchanging Public Keys Sending a signed e-mail
Easily integrate Mac into Microsoft System Center
Master your Macs in the Business Easily integrate Mac into Microsoft System Center Sascha Uhl Business Development Manager [email protected] Leader in Cloud Services Enablement and Desktop Virtualization
UMMS SSL VPN Instructions
UMMS SSL VPN Instructions The document contains the following sections: 1. Introduction 2. Prerequisites 3. Supported software platforms 4. Browser configuration 5. Logon to the UMMS SSL VPN 6. Launching
Realize Greater Profits As An Authorized Reseller Of Network Solutions nsprotect Secure SSL Certificates
Network Solutions Secure Services Realize Greater Profits As An Authorized Reseller Of Network Solutions nsprotect Secure s The Federal Trade Commission (FTC) estimates that 3.2 million US citizens every
SCS: the new Server Certificate Service offering from SWITCH/TERENA
SCS: the new Server Certificate Service offering from SWITCH/TERENA Kaspar Brand SWITCH 2006 SWITCH A very brief SCS project history Discussions with other European NRENs started in 2004, within TERENA
Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
Overview of Extended Validation (EV) SSL
Extended Validation SSL Order Guide 1 Ordering Guide for Extended Validation SSL 1. Vetting Preparation 2. CSR Generation 3. Online Ordering Process 4. Vetting Process 5. Receiving & Installing your Certificate
Digital certificates and SSL
Digital certificates and SSL 20 out of 33 rated this helpful Applies to: Exchange Server 2013 Topic Last Modified: 2013-08-26 Secure Sockets Layer (SSL) is a method for securing communications between
