[Webinar] Streamline your web hosting managementRegister Today

x
?
Solved

Limit use digital signature

Posted on 2012-04-05
6
Medium Priority
?
532 Views
Last Modified: 2012-06-27
Hi,

how can I limit the use of certificate digital signature installed in a PC with windows. I need to allow the use of certificate only for a certain web pages.

In other words,  Which kind of tools I need, to setup a limit for the users can only use the certificate to authenticate in a certain web pages

The main question is that some users have a digital signature for general purposes, and I want to limit that the users can only use the certificate digital signature that are installed into the windows certificate repository, to authenticate only in a web pages included in a list.

Regards
0
Comment
Question by:lnrivera
  • 3
  • 2
6 Comments
 
LVL 51

Expert Comment

by:ahoffmann
ID: 37815132
when you import the cert into windows certificate store, you can select for which typrs this cert can be used, i.e. web site authentication, e-mail signature and such
but IIRC you cannot restrict a cert to be used on specific websites only as windows selects automatically which cert from the store to send, it will only ask if there're more than one cert matching
0
 

Author Comment

by:lnrivera
ID: 37815283
Maybe using a third party software solutions?

Another way, I'm not sure, if a HSM can do it (But the first problem is that HSM hardware solution is too expensive)

Regards
0
 
LVL 66

Expert Comment

by:btan
ID: 37815605
Actually if you are publishing the certificates to Active Directory, we can try to leverage on GPO to enforce some form of lockdown in autoenrollment and distribution of certificates. Also using the Enterprise CA not others.
http://technet.microsoft.com/en-us/library/cc754877.aspx

I was thinking of creating a customised cert template and specifying the security permission for it as well as "Do not automatically reenroll if a duplicate certificate exists in Active Directory" can be sort of some quick restriction to user even getting the certificates.
http://technet.microsoft.com/en-us/library/cc787781(v=ws.10).aspx

But not a full proof approach as certificates in the local user profile or on the user object in Active Directory are only managed if the certificate corresponds to a certificate template in Active Directory. Foreign certificates and certificates that do not contain the template extension are not managed. This is a transparent activity that is processed asynchronously.

Adding, there are add-on management tool like Microsoft's own Certificate Lifecycle Manager which may help - yet to explore further. Just some quick links

General - http://technet.microsoft.com/en-us/library/cc708653(v=ws.10).aspx
Security practice using it - http://technet.microsoft.com/en-us/library/cc720567(v=ws.10).aspx
0
Will You Be GDPR Compliant by 5/28/2018?

GDPR? That's a regulation for the European Union. But, if you collect data from customers or employees within the EU, then you need to know about GDPR and make sure your organization is compliant by May 2018. Check out our preparation checklist to make sure you're on track today!

 
LVL 66

Expert Comment

by:btan
ID: 37815615
On a second thought, if we have control of web server, for example IIS, the webserver can enforce what type of client certificate to use for authentication and access...some configuration to be done for one to one

http://learn.iis.net/page.aspx/478/configuring-one-to-one-client-certificate-mappings/
0
 

Accepted Solution

by:
lnrivera earned 0 total points
ID: 37844672
Finally I filter the access looking for a fingerprint of the certificate in the IP Packets
0
 

Author Closing Comment

by:lnrivera
ID: 37859747
Found workaround by myself
0

Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It's not just another paperwork submission. Serious planning and rigour to managing the whole thought processes need to be put in place. The intent is not on drilling into the details, but to share tips in getting the first thing right to kick-start…
ITIL has an elaborate incident management framework. This article serves as a starter for those who'd like to know more or need to suss out the baseline elements in a typical incident response execution plan on the "need to have" and the "good to ha…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

590 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question