Lesson 5: Implementing Public Key Infrastructure Flashcards
public key infrastructure (PKI)
- digital certificates and public key infrastructure (PKI) are critical to manage identification, authentication, and data confidentiality across most private and public networks
- basic building blocks of PKI include digital certificates and certificate authorities
- aims to prove that owners of public keys are who they say they are
- under PKI, anyone issuing public keys should obtain a digital certificate
- validity of certificate is guaranteed by a certificate authority (CA)
- validity of CA can be established using various models
digital certificate
- essentially a wrapper for a subject’s public key
contains:
- public key
- info about the subject and the certificate’s issuer or guarantor
object identifiers (OIDs)
certificate fields
public certificates
- use standard extensions
private certificates
- use private, proprietary, or custom extensions, but may need dedicated or adapted client and server software to interpret them correctly
key usage
- one of the most standard extensions
- extension defines purpose for which a certificate was issued, such as signing documents or key exchange
Extended Key Usage (EKU)
- typical values used include Server Authentication, Client Authentication, Code Signing, or Email Protection
- more flexible than the Key Usage Field
T or F. An extension can be tagged as critical.
True.
- this means that application processing certificate must be able to interpret extension correctly; otherwise the certificate should be rejected
Distinguished Encoding Rules (DER)
all certificates use this as an encoding scheme to create a binary representation of information in the certificate
certificate authority
person or body responsible for issuing and guaranteeing certificates
functions:
- provide range of certificate services useful to community of users serviced by CA
- ensure validity of certificates and identity of those applying for them (registration)
- establish trust in CA by users and government and regulatory authorities and enterprises, such as financial institutions
- manage servers (repositories) that store and administer the certificates
- perform key and certificate lifecycle management
registration
process by which end users create an account with the CA and become authorized to request certificates
Certificate Signing Request (CSR)
when a subject wants obtain a certificate, it completes a CSR, and submits it to the CA
registration authorities (RAs)
registration function may be delegated by CA to one or more RAs
certificate policies
define different uses of certificate types issued by CA
server certificate
guarantees the identity of e-commerce sites or any sort of website to which users submit data that should be kept confidential
Domain Validation (DV)
- proving the ownership of a particular domain
Extended Validation (EV)
- subjecting to a process that requires more rigorous checks on the subject’s legal identity and control over the domain or software being signed
Subject Alternative Name (SAN)
- subdomains are listed as extensions
- if a new subdomain is added, a new certificate must be issued
Wildcard domain
- certificate is issued to the parent domain and will be accepted as valid for all subdomains (to a single level)
- wildcard certificates cannot be issued with Extended Validation (EV)
T or F. It might be necessary to issue certificates to machines (servers, PCs, smartphones, and tablets), regardless of function.
True