From the course: CISSP Cert Prep (2021): 5 Identity and Access Management
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Certificate-based authentication
From the course: CISSP Cert Prep (2021): 5 Identity and Access Management
Certificate-based authentication
- [Instructor] Digital certificates may be used as an authentication technique to connect to servers via SSH, to power smart cards, and to restrict network access to specific devices. When you use digital certificates for authentication you create certificates similar to the ones that you use to secure websites. The certificates purpose is to provide a trusted copy of a public key to third parties. You retain the corresponding private key to prove that you are the owner of the public key. And let's talk about how we can use keys for authentication. I'll describe the process and then show it to you in action with an SSH connection. First, you create a public private key pair, and you retain the private key as secret knowledge while sharing the public key with the server that you wish to authenticate to. When you attempt to log into a server using key based encryption, the server generates a random challenge message and…
Contents
-
-
-
-
(Locked)
Authentication factors4m 35s
-
(Locked)
Multifactor authentication2m 35s
-
(Locked)
Something you have4m 24s
-
(Locked)
Password authentication protocols3m 10s
-
(Locked)
Single sign-on and federation3m 9s
-
(Locked)
RADIUS and TACACS3m 43s
-
(Locked)
Kerberos and LDAP5m 18s
-
(Locked)
SAML2m 35s
-
(Locked)
Identity as a service (IDaaS)2m 50s
-
(Locked)
OAuth and OpenID Connect2m 55s
-
(Locked)
Certificate-based authentication5m 25s
-
(Locked)
-
-
-
-
-