Solved

How to set up Mutual Authentication with IIS and a normal website.

Posted on 2006-07-03
8
1,887 Views
Last Modified: 2010-08-05
Hi,

I am not really sure how to go about this. We have just been approached by a large financial corporate, wanting to use our website.
They have all sorts of requirements we have to conform to first however, one of them is to do with security.

All of their users are behind some type of firewall/proxy, and they want this thing to have to mutually authenticate with our website. Our website is a normal type of website, it has an SSL certificate and people log in with usernames and passwords. Clients can either enforce the SSL on their group of users, or it is optional.

The site is hosted on a Windows 2000 Server IIS5.0 installation.

They have said they would give me their certificate, and we give them ours. I think this will probably affect existing customers, so we need a new website in IIS pointing to the same folder, with a new certificate. Not sure how to go about it after that.

Can someone please explain to me in laymans terms what they are trying to do, if it will affect existing customers, and how I do it.  I would appreciate it greatly. This question is urgent for us as we need to get up tp speed on this so we can discuss with them by end of week.
0
Comment
Question by:miken05
  • 4
  • 3
8 Comments
 
LVL 30

Expert Comment

by:ded9
Comment Utility
0
 

Author Comment

by:miken05
Comment Utility
Those are more the theory behind it.
I am hoping for some more direct answers if possible. Thanks for your input though.
0
 
LVL 30

Accepted Solution

by:
ded9 earned 500 total points
Comment Utility
0
 

Author Comment

by:miken05
Comment Utility
Thanks I guess that's as good an answer as I'm going to get!
0
Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

 
LVL 30

Expert Comment

by:ded9
Comment Utility
Did the pdf help you. If it did help you in anyway why lower grade.
0
 

Author Comment

by:miken05
Comment Utility
I don't mean it as an insult, C is for average and I thought that sending me a pdf of a companies explanation for NT & IIS4 setup was average. It did help as it showed me the place to look for ticking the boxes, but does not fully answer the questions I posted, which was why I graded it like that.
I thought getting all the points was the main thing? If it was no good I wouldn't have accepted.
So thanks I appreciate it and will have to set up some test labs to see if it will work with existing customers and is exactly the same for the Win2K + IIS5 hosted app:)
0
 
LVL 30

Expert Comment

by:ded9
Comment Utility
Something is better than nothing .

If other expert has provided you with the best answer then sure you should not grade me.
But I have tried my level best with providing with at least a small answer.

Also getting points is not the only thing, if you are not satisfied with my answer then you can request the admin of this page to refund your points.

Grades are  close to heart topic in E.E. If you are not satisfied then you can refund your points.


Ded9
0
 

Expert Comment

by:Vibhug
Comment Utility
The link below is not opening up.
http://www.certipost.be/download/trust/Configuring_IIS4_for_mutual_Authentication.pdf.

Please let me know the solution.
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now