123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

How Ssl Processing Works

Profile Picture
By Author: unknownmem
Total Articles: 128
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

SSL provides authenticated access and encryption of data traveling between a client and a MCITP Certification(http://www.mcitp-70-680.com)
server. A server certificate is required, but SSL can also be configured to use or require the use of client certificates, Where only a server certificate is used, the Web server can be authenticated because its server certificate is signed by a trusted Certification Authority (CA). During the authentication process, a session key is calculated by the server and securely passed to the client. Client and server can then encrypt and decrypt all data that is passed between them.
On the Internet, server certificates from public CAs can be validated by the client because a copy of the root server certificate of the public CAs is stored on the client computer. Private CAs belonging to organizations (for example, Windows Server 2003 CAs installed by the organization) can also be used to issue SSL server certificates. However, because a copy of the root server certificate is not present by default in a client certificate store, a warning will be given to users of such sites. ...
... Users can accept the server certificate as trusted, but they should not.
On the intranet, an organization might choose to Windows 7 certificate(http://www.mcitp-70-680.com)
use its own internal, private CA to issue SSL server certificates. This approach has the advantage of reduced cost, and it limits exposure because no outside organization is responsible for the security of the organization's SSL certificates and thus site communications. However, if the PKI that produces the server certificate is not securely managed, the security of the Web site communications can be more easily compromised.
In addition to producing SSL server certificates for Web sites, an organization's CA can be used to produce client certificates and, where highly sensitive information must be accessed or must traverse the network, client certificates can be required by the SSL-protected Web site. For more information about the use of client certificates for Web site authentication, see Lesson 2 of this chapter.
SSL is commonly used to support client/Web server applications such as e-commerce and remote e-mail access. SSL can also be used to support communications between SQL Server and IIS and between IIS and ISA Server. SSL support between client and server and between IIS and SQL Server consists of server authentication and the encryption of data between the two computers. If ISA Server is the firewall in front of the IIS Web site, SSL can be configured to tunnel from the client directly to the IIS server or to be received by the ISA server and then passed to the
Free A+ exam questions(http://www.examshots.com/certification/A+-64.html0)
IIS server. TLS is an IETF standard version of SSL and may be used in the same way.

Total Views: 265Word Count: 450See All articles From Author

Add Comment

Education Articles

1. How Exercise Books Foster Organization And Creativity
Author: The School Print Company

2. Diy Vs. Professional: Choosing The Right Approach For Your School Logo
Author: The School Print Company

3. Top-rated Icse High School In Bhopal For Quality Education
Author: Ronit Sharma

4. Best B. Tech And Engineering College In Meerut And Up
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD

5. The Five Borough Academic: Cross-cultural Research In Nyc's Diverse Communities
Author: jonesmiller

6. The Future Of Advertising: How Cgi Is Replacing Traditional Commercials
Author: Rajat Sancheti

7. What Is Iso 27001 Procedures And Why Do They Matter?
Author: john

8. Devops Foundation Certification Course
Author: Simpliaxissolutions

9. The Best Gcp Devops Online Training Institute In Bangalore
Author: visualpath

10. Best Hotel Management College In Delhi
Author: harsh thapa

11. Servicenow Online Training | Servicenow Course In India
Author: krishna

12. Best Google Cloud Platform Ai Training In Hyderabad
Author: visualpath

13. Aws Data Engineering Online Training | Data Analytics
Author: naveen

14. Oracle Fusion Cloud Hcm | Oracle Fusion Hcm Training In Pune
Author: visualpath

15. Why Choose The Certified Big Data Foundation? Key Certification Objectives Explained
Author: gsdc

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: