Solved

Synology Diskstation: make certificate so only people who install certificate can logon?

Posted on 2014-02-05
4
625 Views
Last Modified: 2014-02-12
Hi,

I'd like to know if I can make a certificate on a Synology diskstation in that way that only people who have installed the certificate in their webbrowser can logon to the diskstation?

Please advise.
J.
0
Comment
Question by:janhoedt
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 11

Expert Comment

by:MajorBigDeal
ID: 39837567
I don't think you can do https client validation with the Synology DiskStation but you can do VPN which is even more secure.  

http://www.synology.com/en-us/support/tutorials/459
0
 

Author Comment

by:janhoedt
ID: 39838158
I know you can do VPN, I have it running, both Openvpn as well as pptp.
I was looking for certificiate in combination with dual authentication (which already works).

Goal is to setup webaccess for family (photostation etc) and secure it, vpn is to complicated for them to setup + I don't want them on my network continuously.
0
 
LVL 11

Expert Comment

by:MajorBigDeal
ID: 39839986
OK, thanks for the clarification - sorry I don't know of a way to do that.
0
 
LVL 26

Accepted Solution

by:
akahan earned 500 total points
ID: 39841232
No, the purpose of https certificates is not to prevent people who don't have the certificate from logging in; it is to provide assurance to people logging into the diskstation that they are actually connecting to the diskstation (and not to something pretending to be the diskstation).
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Email attacks are the most common methods for initiating ransomware and phishing scams. Attackers want you to open an infected attachment or click a malicious link, and unwittingly download malware to your machine. Here are 7 ways you can stay safe.
This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Suggested Courses

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question