C
H A P T E R
12.1 Overview
This chapter describes how your P-793H v2 can use certificates as a means of
authenticating clients. It gives background information about public-key
certificates and explains how to use them.
A certificate contains the certificate owner's identity and public key. Certificates
provide a way to exchange public keys for use in authentication.
Figure 84 Certificates Example
In the figure above, the P-793H v2 (Z) checks the identity of the notebook (A)
using a certificate before granting it access to the network.
12.1.1 What You Need to Know About Certificates
Certification Authority
A Certification Authority (CA) issues certificates and guarantees the identity of
each certificate owner. There are commercial certification authorities like
CyberTrust or VeriSign and government certification authorities. You can use the
P-793H v2 to generate certification requests that contain identifying information
and public keys and then send the certification requests to a certification
authority.
Certificate File Formats
The certification authority certificate that you want to import has to be in one of
these file formats:
P-793H v2 User's Guide
12
Certificates
193