SlideShare a Scribd company logo
Design and Analyze
Secure Networked Systems
6
Prof. Edward Chow @ Colorado Univ.
Note by waegaein@github.com
Creation and Installation of Server Certificate
1. Generate private key with passphrase.
2. Generate .pem file for Certificate Signing Request (CSR).
3. Send the CSR to a CA.
4. Receive .pem file for certificate from CA.
5. Copy the certificate file to serving directory.
6. Copy private key file to secure directory.
Creation and Installation of Client Certificate
1. Generate private key with passphrase.
2. Generate .pem file for Certificate Signing Request (CSR).
3. Send the CSR to a CA.
4. Receive .p12 file for certificate from CA.
5. Copy the certificate file to directory that browsers can
access.
6. Copy private key file to secure directory.
Mutual Authentication of Client and Server
1. Client requests access to server with HTTPS protocol.
2. Server presents Server Certificate and request client to
present Client Certificate.
3. Client presents Client Certificate.
4. Server responds with credential information.

More Related Content

PDF
Docker meetup Mountain View - Bernstein
PDF
Certificate Management on pfSense 2.4 - pfSense Hangout September 2017
PDF
Design and Analyze Secure Networked Systems - 3
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PPT
15 ma cs and signatures
PPT
8.SSL encryption.ppt
PDF
SSL/TLS
Docker meetup Mountain View - Bernstein
Certificate Management on pfSense 2.4 - pfSense Hangout September 2017
Design and Analyze Secure Networked Systems - 3
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
15 ma cs and signatures
8.SSL encryption.ppt
SSL/TLS

Similar to Design and Analyze Secure Networked Systems - 6 (20)

PDF
TLS/SSL Protocol Design 201006
PDF
TLS Optimization
PDF
Tlsoptimizationprint 120224194603-phpapp02
PPT
ch14.ppt
PDF
TLS/SSL Protocol Design
PDF
Secure PostgreSQL deployment
PPTX
Module III CNS Kerberos and its example.pptx
PPT
Ch12 Cryptographic Protocols and Public Key Infrastructure
PDF
CS6004 CYBER FORENSICS
PDF
Computer security module 4
PPT
Introduction to distributed security concepts and public key infrastructure m...
PDF
unit4_securitypractice(oncase study).ppt
PDF
Network security unit 4,5,6
PPSX
Web security for e-commerce
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPT
Seminar on ECommerce
PDF
5.[29 38]a practical approach for implementation of public key infrastructure...
PDF
5.[29 38]a practical approach for implementation of public key infrastructure...
PDF
SSL intro
PPT
SSL.ppt
TLS/SSL Protocol Design 201006
TLS Optimization
Tlsoptimizationprint 120224194603-phpapp02
ch14.ppt
TLS/SSL Protocol Design
Secure PostgreSQL deployment
Module III CNS Kerberos and its example.pptx
Ch12 Cryptographic Protocols and Public Key Infrastructure
CS6004 CYBER FORENSICS
Computer security module 4
Introduction to distributed security concepts and public key infrastructure m...
unit4_securitypractice(oncase study).ppt
Network security unit 4,5,6
Web security for e-commerce
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Seminar on ECommerce
5.[29 38]a practical approach for implementation of public key infrastructure...
5.[29 38]a practical approach for implementation of public key infrastructure...
SSL intro
SSL.ppt
Ad

More from Don Kim (10)

PDF
Clean Code - 5
PDF
Clean Code - 4
PDF
Clean Code - 3
PDF
Clean Code - 2
PDF
Clean Code - 1
PDF
Design and Analyze Secure Networked Systems - 7
PDF
Design and Analyze Secure Networked Systems - 5
PDF
Design and Analyze Secure Networked Systems - 4
PDF
Design and Analyze Secure Networked Systems - 2
PPTX
Design and Analyze Secure Networked Systems - 1
Clean Code - 5
Clean Code - 4
Clean Code - 3
Clean Code - 2
Clean Code - 1
Design and Analyze Secure Networked Systems - 7
Design and Analyze Secure Networked Systems - 5
Design and Analyze Secure Networked Systems - 4
Design and Analyze Secure Networked Systems - 2
Design and Analyze Secure Networked Systems - 1
Ad

Recently uploaded (20)

PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
assetexplorer- product-overview - presentation
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Designing Intelligence for the Shop Floor.pdf
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Understanding Forklifts - TECH EHS Solution
PDF
System and Network Administraation Chapter 3
PDF
System and Network Administration Chapter 2
PPT
Introduction Database Management System for Course Database
PDF
Digital Strategies for Manufacturing Companies
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
top salesforce developer skills in 2025.pdf
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
How to Migrate SBCGlobal Email to Yahoo Easily
assetexplorer- product-overview - presentation
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Operating system designcfffgfgggggggvggggggggg
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Designing Intelligence for the Shop Floor.pdf
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
2025 Textile ERP Trends: SAP, Odoo & Oracle
Understanding Forklifts - TECH EHS Solution
System and Network Administraation Chapter 3
System and Network Administration Chapter 2
Introduction Database Management System for Course Database
Digital Strategies for Manufacturing Companies
PTS Company Brochure 2025 (1).pdf.......
wealthsignaloriginal-com-DS-text-... (1).pdf
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Wondershare Filmora 15 Crack With Activation Key [2025
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
top salesforce developer skills in 2025.pdf

Design and Analyze Secure Networked Systems - 6

  • 1. Design and Analyze Secure Networked Systems 6 Prof. Edward Chow @ Colorado Univ. Note by waegaein@github.com
  • 2. Creation and Installation of Server Certificate 1. Generate private key with passphrase. 2. Generate .pem file for Certificate Signing Request (CSR). 3. Send the CSR to a CA. 4. Receive .pem file for certificate from CA. 5. Copy the certificate file to serving directory. 6. Copy private key file to secure directory.
  • 3. Creation and Installation of Client Certificate 1. Generate private key with passphrase. 2. Generate .pem file for Certificate Signing Request (CSR). 3. Send the CSR to a CA. 4. Receive .p12 file for certificate from CA. 5. Copy the certificate file to directory that browsers can access. 6. Copy private key file to secure directory.
  • 4. Mutual Authentication of Client and Server 1. Client requests access to server with HTTPS protocol. 2. Server presents Server Certificate and request client to present Client Certificate. 3. Client presents Client Certificate. 4. Server responds with credential information.