?
Solved

SSL Client authentication

Posted on 2014-03-24
1
Medium Priority
?
474 Views
Last Modified: 2014-03-24
From a very high level, my question is:  Is is tru that the server decides whther to invoke SSL client authentication and require client authentication from the client and not the other way around.

I believe the answer should be "yes, the server starts the authentication process, but I need to be sure".  Need to get past a mental block on my part.

Thanks
0
Comment
Question by:Anthony Lucia
1 Comment
 
LVL 15

Accepted Solution

by:
Giovanni Heward earned 2000 total points
ID: 39950752
SSL/TLS Handshake
Is is tru that the server decides whther to invoke SSL client authentication and require client authentication from the client and not the other way around.

I believe the answer should be "yes, the server starts the authentication process, but I need to be sure".  Need to get past a mental block on my part.

Yes, the server configuration determines whether client side SSL authentication is required.  Server side SSL authentication is mandatory, client side is optional. See RFC 5246.
0

Featured Post

Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

2017 was a scary year for cyber security.  Hear what our security experts say that hackers have in store for us in 2018.
Are you looking to start a business? Do you own and operate a small company? If so, here are some courses you need to take before you hire a full-time IT staff.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

592 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question