Table of Contents

Search

  1. About the Data Vault Administrator Guide
  2. Introduction to the Data Vault
  3. Data Vault Service Startup and Shutdown
  4. Data Vault Configuration
  5. Data Vault SSL Setup
  6. Data Vault ODBC Setup
  7. Data Vault Administration
  8. Data Repartitioning
  9. Partial Data Vault Copy
  10. Archived Data Migration
  11. Bulk File Uploader
  12. Data Vault Administration Tool
  13. Data Vault Logs
  14. User Account Privileges
  15. ssasql Command Line Program
  16. Data Vault Audit Log
  17. Sample Configuration Files

Data Vault Administrator Guide

Data Vault Administrator Guide

Generate Certificate Authority and Certificate Authority-Signed Certificates

Generate Certificate Authority and Certificate Authority-Signed Certificates

A Certificate Authority (CA) is an entity that issues digital certificates.
A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows other parties to rely upon signatures or on assertions made about the private key that corresponds to the certified public key. A CA acts as a third party trusted both by the owner of the certificate and by the party that relies upon the certificate. The format of these certificates is specified by the X.509 standard.
You will need both a CA root certificate and a server certificate. Place the server certificate only at the server location. Place the CA certificate only at the client side. During a connection, the client sends a hello that contains a list of its ciphers to the server. The server then sends a list of supported ciphers and its server certificate as a response. The client authenticates the server certificate with the CA certificate and generates a symmetric certificate. This symmetric certificate is passed to the server. The server generates its own symmetric certificate. This symmetric certificate is used to create a symmetric cryptography bridge between the client and server, and start an encrypted session.
You can create your own CA certificate and use it to generate a server key and certificate.

0 COMMENTS

We’d like to hear from you!