Types of certificates
Working with SSL certificates in a web server environment involves three types of
certificates.
Server certificates
These identify servers to clients via SSL-based server authentication. You can use
server authentication with or without client authentication. However, server
authentication is a requirement for an encrypted SSL session.
Example: E-commerce sites usually support
certificate-based server authentication to encrypt personal information, so that credit
card numbers, for example, cannot easily be intercepted.
With CSWS's Certificate Tool: You can create a certificate
request (Option 3) and then self-sign (Option 4) it. Or, in a production environment, you
have it signed by a trusted certificiate authority.
Client certificates
These identify clients to servers using SSL-based client authentication. Typically, the
identity of the client is assumed to be the same as the identity of a human being, such as
an employee in an enterprise.
Example: A corporate intranet might give a new
employee a client SSL certificate that allows the company's servers to identify that
employee and authorize access to the company's servers.
With CSWS's Certificate Tool: You can create a client
certificate request (using the same option as for a server certificate request) and then
sign the request (Option 6) using your own CA
certificate.
CA certificates
These identify certificate authorities. They can be trusted root or intermediate
certificates that client browser and web servers use CA certificates to determine what
other certificates can be trusted.
Example: The CA certificates stored in your
web browser (either Internet Explorer or Netscape Navigator) determine what other
certificates that browser can authenticate without warning the user that a site has an
untrusted certificate.
With CSWS's Certificate Tool: You can create a certificate
authority (CA) certificate using Option 5.
Recommended
reading:
Introduction to SSL concepts
Encryption and Digital Certificates
Managing certificates |