Digital certificates may be used as an authentication factor, providing a digital version of a something you have factor. In this video, Mike Chapple explains how digital certificates are used for SSH connections, with smart cards, and for network access.
- [Instructor] Digital cerfificates may be used…for authentication.…Among other uses, they may be used…to connect to servers by SSH,…to power smart cards,…and for restricting network access to specific devices.…When you use digital certificates for authentication,…you create a digital certificate similar…to the one used to secure websites.…The certificate's purpose is to provide a trusted copy…of a public key to third parties.…You retain the corresponding private key…to prove that you are the owner…of the public key in the cerfificate.…
Before we dive into cerfificates,…let's talk about how we can use keys for authentication.…I'll describe the process,…and then show it you in action with an SSH connection.…When you want to use keys for encryption,…you first create a public/private key pair.…You retain the private key as secret knowledge,…and then share the public key…with the server you wish to authenticate to.…When you attempt to log in…to a server using key-based encryption,…the server generates a random message…
Released
10/23/2017Instructor Mike Chapple has designed the training around the most recent version of CompTIA Security+, SY0-501, which expands coverage of mobile and cloud technologies. By learning about the topics in this course, you'll be prepared to answer questions from the latest exam—and strengthen your own organization's systems and defenses. To join one of Mike's free study groups, visit certmike.com.
We are a CompTIA Content Publishing Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- Identification methods
- Authentication factors
- Multifactor authentication
- Single sign-on
- Authorization and access controls
- Account management
Share this video
Embed this video
Video: Certificate-based authentication