cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
355
Views
5
Helpful
3
Replies

PKI - CA question

lgontarsk
Level 1
Level 1

Hi, I'm reading about PKI.... what prevents bogus devices from requesting a valid CA certificate - how does the CA verify that the requestor is valid when deciding whether to issue an x.509 certificate to a device?

Thanks, Lisa G

1 Accepted Solution

Accepted Solutions

Jon Marshall
Hall of Fame
Hall of Fame

Hi Lisa

In answer to your question it is is to do with how the certificate has been validated as to how much trust you put in it eg.

I can apply for a personal verisign certificate using just my e-mail address as identity. I will get a certificate but when using my certfiate people should be aware of how little i did to prove who i was.

For other certificates the company or individual may provide passport/driving license etc. details which give the certificate far more trust.

Obviously this is with a public CA such as Verisign. If you set up your own CA within your company then the CA administrator has a lot more control over who to issue a certificate to.

HTH

Jon

View solution in original post

3 Replies 3

Jon Marshall
Hall of Fame
Hall of Fame

Hi Lisa

In answer to your question it is is to do with how the certificate has been validated as to how much trust you put in it eg.

I can apply for a personal verisign certificate using just my e-mail address as identity. I will get a certificate but when using my certfiate people should be aware of how little i did to prove who i was.

For other certificates the company or individual may provide passport/driving license etc. details which give the certificate far more trust.

Obviously this is with a public CA such as Verisign. If you set up your own CA within your company then the CA administrator has a lot more control over who to issue a certificate to.

HTH

Jon

Thanks... very helpful.

In my experience with CA's that are internal, if it is a Microsoft Enterprise CA you can control through Active Directory. You can have a GPO setup to automatically deploy computer/user certificates once they have authenticated with the domain.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: