Changes for page Sending certificates to a webservice
Last modified by Erik Bakker on 2024/08/26 12:58
From version 1.1
edited by Erik Bakker
on 2022/06/12 09:53
on 2022/06/12 09:53
Change comment:
There is no comment for this version
To version 2.2
edited by Erik Bakker
on 2022/06/12 09:56
on 2022/06/12 09:56
Change comment:
Update document after refactoring.
Summary
-
Page properties (2 modified, 0 added, 0 removed)
Details
- Page properties
-
- Title
-
... ... @@ -1,1 +1,1 @@ 1 -novice-securing-your-data-traffic- what-are-certificates1 +novice-securing-your-data-traffic-sending-certificates-to-a-webservice - Content
-
... ... @@ -1,9 +1,4 @@ 1 1 {{container}}{{container layoutStyle="columns"}}((( 2 - 3 - 4 - 5 -# What are certificates 6 - 7 7 In this microlearning, we will focus on what certificates are and will relate this to how you could use them to secure your data traffic. 8 8 9 9 Should you have any questions, please contact academy@emagiz.com. ... ... @@ -11,10 +11,10 @@ 11 11 * Last update: April 22th, 2021 12 12 * Required reading time: 7 minutes 13 13 14 - ##1. Prerequisites9 +== 1. Prerequisites == 15 15 * Basic knowledge of the eMagiz platform 16 16 17 - ##2. Key concepts12 +== 2. Key concepts == 18 18 This microlearning centers around what are certificates. 19 19 20 20 By certificates we mean: A trustworthy document that is interchanged between parties to verify that both parties are who they claim to be ... ... @@ -30,7 +30,7 @@ 30 30 31 31 32 32 33 - ##3. What are certificates28 +== 3. What are certificates == 34 34 35 35 In this microlearning, we will focus on what certificates are and will relate this to how you could use them to secure your data traffic. 36 36 ... ... @@ -47,7 +47,7 @@ 47 47 48 48 * What are certificates used for? 49 49 50 - ###3.1 What are certificates used for?45 +=== 3.1 What are certificates used for? === 51 51 52 52 One application of the use of certificates lies in the authentication. With certificates in this form, you have a method of verifying that the person that claims to be a certain individual is indeed that individual. One application lies in the encryption of data when it is being exchanged between two parties. This ensures that an independent third party cannot see what data is exactly exchanged between these two parties. 53 53 ... ... @@ -74,7 +74,7 @@ 74 74 75 75 To recap, you have a server certificate (belonging to the party that receives the request) and you have a client certificate (belonging to the party that executes the request). With the help of a client certificate, a server can limit who can gain access to the server based on the certificate they provide at the door. If a server is publicly accessible but makes use of a certificate we say the connection is secured with the help of one-way SSL (HTTPS traffic). If the server requires a client certificate we talk about two-way SSL. 76 76 77 - ###3.2 What if I want to use a self-signed certificate?72 +=== 3.2 What if I want to use a self-signed certificate? === 78 78 79 79 There is no technical requirement to always use certificates that are signed by a CA. Another approach is to create a self-signed certificate. This way the party that receives the request will look in the so-called truststore. The truststore houses all certificates (public keys) of trusted parties. 80 80 ... ... @@ -84,7 +84,7 @@ 84 84 85 85 The combination of such a private key and a public key is called a key pair. 86 86 87 - ###3.3 How to get your key signed by a trusted party82 +=== 3.3 How to get your key signed by a trusted party === 88 88 89 89 In some cases, an external party with whom we do business asks us to manage the certificate but has the requirement that the certificate that we have created and manage needs to be signed by a trusted party before it can be used in the field. To do you need to create a certificate signing request. You can do this with the help of tools such as Keystore Explorer, more on the technical details in a later microlearning. 90 90 ... ... @@ -92,17 +92,17 @@ 92 92 93 93 After you have configured this correctly you should secure it via a password and save it. From here on you can create a certificate signing request (CSR). After a while, you will get a response back from the CA. You can link this to your keypair via an Import CA Reply. The result can be seen in Keystore Explorer. 94 94 95 - ###3.4 Encryption90 +=== 3.4 Encryption === 96 96 97 97 To ensure encryption the client locks the data with the help of the public key in a format that can only be read by the intended party. At that point, only the party that has the matching private key has the option to decrypt the message and process it. 98 98 99 99 100 100 101 - ##4. Assignment96 +== 4. Assignment == 102 102 103 103 Read up on certificates and how they work in communication with other parties and see if you get what the function of certificates is. 104 104 105 - ##5. Key takeaways100 +== 5. Key takeaways == 106 106 107 107 * Certificates are all about trust 108 108 * When a certificate is trusted by a CA it is natively trusted by others ... ... @@ -111,13 +111,12 @@ 111 111 112 112 113 113 114 - ##6. Suggested Additional Readings109 +== 6. Suggested Additional Readings == 115 115 116 116 If you are interested in this topic and want more information on it please read the release notes provided by eMagiz 117 117 118 - ##7. Silent demonstration video113 +== 7. Silent demonstration video == 119 119 120 120 {{video url="https://youtu.be/7TxZGQKXZnQ" attachment="Certificates * The Adventure" videoPoster="http://i.imgur.com/Ot5DWAW.png"/}} 121 121 122 122 )))((({{toc/}}))){{/container}}{{/container}} 123 -