[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

SSL and SSL Client authentication

Posted on 2014-03-21
1
Medium Priority
?
391 Views
Last Modified: 2014-03-24
Can SSL authentication be used just before the session invokes a SSL data transfer protocol (with its own hadnshaking?)

In other words, can you use the two protocols together seemlessly without need for user input.

Thanks
0
Comment
Question by:Anthony Lucia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 38

Accepted Solution

by:
Mahesh earned 2000 total points
ID: 39946555
user input is required in case of SSL
When you 1st access ssl enabled sites, their certificate public key sent to you through browser
Now you enter your username and password and encrypt that with server public key and sent to server
Server has associated private key which can decrypt that credentials and again send  confirmation to client by encrypting it with its private key
Again client is able to decrypt that with provided public key

Also if certificate mapping is enabled, then user has to provide its client certificate as well

Mahesh
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
What we learned in Webroot's webinar on multi-vector protection.
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question