Ssl Infrastructure; A Brief Introduction To Ssl - Red Hat NETWORK SATELLITE 5.1.0 - CLIENT Configuration Manual

Client configuration
Hide thumbs Also See for NETWORK SATELLITE 5.1.0 - CLIENT:
Table of Contents

Advertisement

Chapter 3.

SSL Infrastructure

For Red Hat Network customers, security concerns are of the utmost importance. One of the
strengths of Red Hat Network is its ability to process every single request over Secure Sockets
Layer, or SSL. To maintain this level of security, customers installing Red Hat Network within
their infrastructures must generate custom SSL keys and certificates.
Manual creation and deployment of SSL keys and certificates can be quite involved. Both the
RHN Proxy Server and the RHN Satellite Server allow you to build your own SSL keys and
certificates based on your own private Certificate Authority (CA) during installation. In addition, a
separate command line utility, the RHN SSL Maintenance Tool, exists for this purpose.
Regardless, these keys and certificates must then be deployed to all systems within your
managed infrastructure. In many cases, deployment of these SSL keys and certificates is
automated for you. This chapter describes efficient methods for conducting all of these tasks.
Please note that this chapter does not explain SSL in depth. The RHN SSL Maintenance Tool
was designed to hide much of the complexity involved in setting up and maintaining this
public-key infrastructure (PKI). For more information, please consult some of the many good
references available at your nearest bookstore.

1. A Brief Introduction To SSL

SSL, or Secure Sockets Layer, is a protocol that enables client-server applications to pass
information securely. SSL uses a system of public and private key pairs to encrypt
communication passed between clients and servers. Public certificates can be left accessible,
while private keys must be secured. It's the mathematical relationship (a digital signature)
between a private key and its paired public certificate that makes this system work. Through this
relationship, a connection of trust is established.
Note
Throughout this document we discuss SSL private keys and public certificates.
Technically both can be referred to as keys (public and private keys). But it is
convention, when discussing SSL, to refer to the public half of an SSL key pair
(or key set) as the SSL public certificate.
An organization's SSL infrastructure is generally made up of these SSL keys and certificates:
• Certificate Authority (CA) SSL private key and public certificate — only one set per
organization generally generated. The public certificate is digitally signed by its private key.
The public certificate is distributed to every system.
• Web server SSL private key and public certificate — one set per application server. The
public certificate is digitally signed by both its private key and the CA SSL private key. We
11

Advertisement

Table of Contents
loading

Table of Contents