503049-Chapter 11.2 Internet Authentication Applications
503049-Chapter 11.2 Internet Authentication Applications
2
Internet Authentication
Applications
• Short-lived certificates
– Used to provide authentication for applications such as grid computing, while
avoiding some of the overheads and limitations of conventional certificates
– They have validity periods of hours to days, which limits the period of misuse if
compromised
• Proxy certificates
– Also used in applications such as grid computing
– Allow a user to easily create a credential to access resources in some
environment, without needing to provide their full certificate and right
• Functions:
– Registration
– Certification: process to issue CA
– Key pair recovery: forgotten passwords, corrupted
HDs; restore key pairs from authorized backup
– Key pair update: update with new keys
– Revocation request: a users CA advises to revoke
– Cross certification: two CAs exchange info
Users, servers
PKI: HW, SW, people,
policies, and procedures
to create, manage, distribute, Certain admin func of CA
and revoke DCs based
on asymmetric cryptography
Issues
of CA