Questions tagged [pki]

Public Key Infrastructure

PKI is a technical and/or organizational way to bind public keys with an identity. The most common types of PKI uses X.509 certificates (and in particular the IETF PKIX profiles).

823 questions
-1
votes
1 answer

PKI-Certification Authority

What are the best technology for the implementation of CA with respect to programming language ,database ,openssl etc
-1
votes
1 answer

Create a correct PKCS7/CMS (ASN.1) from existing XML Signature in PHP

I have an XML digital signature, (xmlns="http://www.w3.org/2000/09/xmldsig) and I want to convert this into a PKCS7 signature. I belive I have to use an ASN.1 encoder such as https://github.com/FGrosse/PHPASN1 but I cannot understand how to create…
Patrik Grinsvall
  • 584
  • 1
  • 4
  • 22
-1
votes
1 answer

How to deploy PKI in Azure using JSON template (windows server)

I'm new to Azure. I have JSON template that successfully deploys VM. Can I add some code to JSON template to deploy this VM with rootCA. Or some syntax for AD CS deployment. I googled a lot but there are only DSC methods.
oldone
  • 1
-1
votes
1 answer

Configuring multiple Certificate Distribution Points on a Cisco VPN Gateway which are ALL checked

I have an architecture where there is a single root CA and multiple sub-CA's. Each sub-CA publishes certificates for devices in it's "domain". Within each domain is a VPN gateway (Cisco router). I would like to determine if it is possible to…
-1
votes
1 answer

How to create valid public and private key for digital sign?

How i can get free X509 Certificates with true public and private key? I use .net to encrypt and decrypt document. Its can import pfx file. And now how i can create single pfx file with public & private for each User?
mlibre
  • 2,460
  • 3
  • 23
  • 32
-1
votes
2 answers

Replace Return charcter to

I have pkcs10 request in a file, which i need to convert the new line character in the file to " " Example: -----BEGIN NEW CERTIFICATE…
Niranjan M.R
  • 343
  • 1
  • 6
  • 23
-1
votes
1 answer

how to build device authentication and key distribution between raspberry pi and server

I have several raspberry pi devices, and I want to link them to one web application securely with ssl in public key infrastructure. and the raspberry pi should keep a credential key inside its memory for the device authentication. But I have two…
user824624
  • 7,077
  • 27
  • 106
  • 183
-2
votes
1 answer

Does HTTPS in Google Cloud Functions support mTLS using PKI?

I'm looking to serve HTTPS downloads which are authenticated in both directions using mTLS, the requests and responses being signed with certificates issued by a private CA. The purpose of this is securing OTA updates of an embedded device (I need…
Tarmo
  • 3,728
  • 1
  • 8
  • 25
-2
votes
1 answer

Can we change the SSL certificate delivered by Avast Web/Mail Shield Self-signed Root for IMAP mail client of Kolab 16 server?

A pop-up window shows a warning message about a self signed certificate at every start of Outlook on a PC and on Samsung mail at the initial configuration. Warning about the SSL certificate in Outlook 2016 Where is this certificate stored (Kolab 16…
Philippe
  • 1
  • 2
-2
votes
1 answer

Over HTTPS, why browser trusts that it is communicating to the server it really intends to?

Our browsers and computer has a set of root certificates of the CAs. Take an example. VeriSign's root certificate is installed on my machine. So I can trust all the certificates issued by that certificate. If VeriSign has issued 10 server…
Learner
  • 4,661
  • 9
  • 56
  • 102
-2
votes
3 answers

How does SHA256 protect against active MITM attacks?

I am planning to take an SSL certificate implementing SHA256. How does SHA256 protect against active Man-in-the-middle attacks? Also, what does 256 mean in SHA256, when a certifying authority say 2048 bit encryption.
-3
votes
1 answer

PHP CAC Common Access Card Register and Login

I don't have a clue how to make my PHP website register and login with CAC Common Access Card. I developed for the past year a site and I can't sell it because off this. I have no clue. No HTTPS no SSL no PKI.
-3
votes
2 answers

confusion in public and private key

in Encryption and decryption same key is use to to convert plan text to cipher and cipher to plan text. so why in public key cryptograpy method sender Encrypt using receiver public key and receiver decrypt using his own private key ?
1 2 3
54
55