Digital certificates may be used as an authentication factor, providing a digital version of a “something you have” factor. In this video, Mike Chapple explains how digital certificates are used for SSH connections, with smart cards, and for network access.
- [Instructor] Digital certificates may be used…for authentication.…Among other uses, they may be used to connect to servers…by SSH, to power smart cards, and for restricting…network access to specific devices.…Certificate-based authentication is often used…for device authentication.…In cases where devices such as servers, end points,…and network devices need to authenticate to each other…without the involvement of a person.…When you use digital certificates for authentication,…you create a digital certificate similar to the one…used to secure websites.…
The certificate's purpose is to provide a trusted copy…of a public key to third parties.…You retain the corresponding private key…to prove that you are the owner of the public key…and the certificate.…Before we dive into certificates,…let's talk about how we can use keys for authentication.…I'll describe the process…and then show it you in action with an SSH connection.…When you want to use keys for encryption,…you first create a public/private key pair.…You retain the private key as secret knowledge…
To join one of Mike's free study groups for access to bonus tips and practice questions, visit certmike.com.
- Identity and access management
- Using access cards and biometrics
- Multifactor authentication
- Password authentication protocols
- Device authentication
- Identity management life cycle
- Access control lists
Skill Level Intermediate
Q: This course was updated on 05/18/2018. What changed?
A: New videos were added that cover subject/object model. In addition, the following topics were updated: registration and identity proofing, SSO and federation, and advanced authorization concepts.