?
Solved

Private certificate

Posted on 2014-09-13
2
Medium Priority
?
87 Views
Last Modified: 2014-09-28
Is it possible to create a certificate that has to be installed to be able to access a website, rather than normal way of delivering the certificate?

I want to protect a website, where only users who have installed the certificate on their PC is able to access the website.

Not quite sure if im explaining myself correctly, I just want to protect a website which needs to be accessible on the internet, but want to encrypt the data, and limit access above the normal username/password options, and without the expense of RSA tokens.

Thank you
0
Comment
Question by:tonelm54
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 111

Assisted Solution

by:Ray Paseur
Ray Paseur earned 1000 total points
ID: 40320970
Given that the "normal" username / password options are acceptable for Fidelity, PayPal, E-Trade, Facebook, Twitter, Google, etc., why are you concerned?  Maybe you want to look for another technology, not a web site, but some other kind of way of delivering the data?
0
 
LVL 83

Accepted Solution

by:
Dave Baldwin earned 1000 total points
ID: 40321041
While you can create a self-signed certificate, the biggest security problem is people sharing their usernames and passwords.  And with your method, your problem will be people sharing your public certificate to access your site.  It may make your site a little less accessible but only a little.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

These days socially coordinated efforts have turned into a critical requirement for enterprises.
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
The viewer will learn how to create and use a small PHP class to apply a watermark to an image. This video shows the viewer the setup for the PHP watermark as well as important coding language. Continue to Part 2 to learn the core code used in creat…
Suggested Courses

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question