1 / 11

PKI 2: Protezione del traffico Web tramite SSL

PKI 2: Protezione del traffico Web tramite SSL. Fabrizio Grossi. Overview. Introduction to SSL Security Enabling SSL on a Web Server Implementing Certificate-based Authentication. Introduction to SSL Security. Why Use SSL to Secure Web Traffic? Multimedia: Using SSL to Secure Web Traffic

quanda
Download Presentation

PKI 2: Protezione del traffico Web tramite SSL

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PKI 2: Protezione del traffico Web tramite SSL Fabrizio Grossi

  2. Overview • Introduction to SSL Security • Enabling SSL on a Web Server • Implementing Certificate-based Authentication

  3. Introduction to SSL Security • Why Use SSL to Secure Web Traffic? • Multimedia: Using SSL to Secure Web Traffic • Certificates Used for an SSL Session • Guidelines for Choosing a Private or Commercial CA

  4. Why Use SSL to Secure Web Traffic? • By default, HTTP packets are transmitted as plaintext • Implement SSL to: • Encrypt the transmitted data at the application layer • Enable Web clients to authenticate the Web server

  5. Web Server Internet HTTP Web Client Web Server Using SSL to Secure Web Traffic

  6. Certificates Used for an SSL Session

  7. Guidelines for Choosing a Private or Commercial CA

  8. Enabling SSL on a Web Server • How to Acquire a Web Server Certificate from a Private CA • How to Acquire a Web Server Certificate from a Commercial CA • SSL Configuration Options • Certificate Deployment for Complex Configurations • Guidelines for Enabling SSL Security

  9. Implementing Certificate-based Authentication • Web-based Authentication Methods • Types of Certificate Mapping • How to Implement Certificate Mapping in IIS • How to Implement Certificate Mapping in Active Directory • Guidelines for Certificate Mapping

  10. Web-based Authentication Methods * = low; ***** = high

  11. Types of Certificate Mapping

More Related