From the course: CISSP Cert Prep (2021): 5 Identity and Access Management

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Certificate-based authentication

Certificate-based authentication

From the course: CISSP Cert Prep (2021): 5 Identity and Access Management

Start my 1-month free trial

Certificate-based authentication

- [Instructor] Digital certificates may be used as an authentication technique to connect to servers via SSH, to power smart cards, and to restrict network access to specific devices. When you use digital certificates for authentication you create certificates similar to the ones that you use to secure websites. The certificates purpose is to provide a trusted copy of a public key to third parties. You retain the corresponding private key to prove that you are the owner of the public key. And let's talk about how we can use keys for authentication. I'll describe the process and then show it to you in action with an SSH connection. First, you create a public private key pair, and you retain the private key as secret knowledge while sharing the public key with the server that you wish to authenticate to. When you attempt to log into a server using key based encryption, the server generates a random challenge message and…

Contents