SlideShare ist ein Scribd-Unternehmen logo
1 von 31
 
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object],# Verisign http://www.verisign.com/products-services/security-services/pki/pki-application/email-digital-id/index.html # Thawte http://www.thawte.com/secure-email/personal-email-certificates/index.html # Globalsign http://www.globalsign.net/digital_certificate/personalsign/index.cfm # Comodogroup http://www.comodogroup.com/products/certificate_services/email_certificate.html
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object]
[object Object]
[object Object]
Field Meaning Version Which version of X.509 Serial number This number plus the CA s name uniquely identifies the certificate Signature algorithm The algorithm used to sign certificate Issuer X.500 name of CA Validity Period The starting and ending period Subject name The entity whose key being certified Public Key The subject’s pubic key and ID of algorithm using it.
[object Object],[object Object]
Application Description Makecert Generate a X.509 certificate for testing purpose only Certmgr Assembles certificates into CTL (certificate trust list) and can also be used for revoking lists (CRLs). Chktrust Verifies the validity of a file signed with an X.509 certificate Cert2spc Creates, for test purposes only, a Software Publisher's Certificate (SPC) from one or more X.509 certificates.
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
 
 
 
 
Namespace Involved
Token Types Involved
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Kerberos Authentication Process In Windows
Kerberos Authentication Process In WindowsKerberos Authentication Process In Windows
Kerberos Authentication Process In Windows
niteshitimpulse
 
Kerberos Authentication Protocol
Kerberos Authentication ProtocolKerberos Authentication Protocol
Kerberos Authentication Protocol
Bibek Subedi
 

Was ist angesagt? (20)

Using Kerberos
Using KerberosUsing Kerberos
Using Kerberos
 
Kerberos
KerberosKerberos
Kerberos
 
Kerberos
KerberosKerberos
Kerberos
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication Application
 
An Introduction to Kerberos
An Introduction to KerberosAn Introduction to Kerberos
An Introduction to Kerberos
 
Kerberos case study
Kerberos case studyKerberos case study
Kerberos case study
 
Ch15
Ch15Ch15
Ch15
 
Building basic public key infrastucture (PKI)
Building basic public key infrastucture (PKI)Building basic public key infrastucture (PKI)
Building basic public key infrastucture (PKI)
 
Kerberos protocol
Kerberos protocolKerberos protocol
Kerberos protocol
 
Kerberos
KerberosKerberos
Kerberos
 
Kerberos
KerberosKerberos
Kerberos
 
Kerberos Authentication Process In Windows
Kerberos Authentication Process In WindowsKerberos Authentication Process In Windows
Kerberos Authentication Process In Windows
 
Kerberos authentication
Kerberos authenticationKerberos authentication
Kerberos authentication
 
Kerberos
KerberosKerberos
Kerberos
 
Certification authority
Certification   authorityCertification   authority
Certification authority
 
Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication
 
Kerberos Authentication Protocol
Kerberos Authentication ProtocolKerberos Authentication Protocol
Kerberos Authentication Protocol
 
Kerberos (1)
Kerberos (1)Kerberos (1)
Kerberos (1)
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Kerberos explained
Kerberos explainedKerberos explained
Kerberos explained
 

Ähnlich wie X 509 Certificates How And Why In Vb.Net

Internet Security Basics
Internet Security BasicsInternet Security Basics
Internet Security Basics
Bipin Jethwani
 
Java Cert Pki
Java Cert PkiJava Cert Pki
Java Cert Pki
phanleson
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
Svetlin Nakov
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
JUSTSTYLISH3B2MOHALI
 
Session 10 Tp 10
Session 10 Tp 10Session 10 Tp 10
Session 10 Tp 10
githe26200
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication Models
Raj Chanchal
 

Ähnlich wie X 509 Certificates How And Why In Vb.Net (20)

Internet Security Basics
Internet Security BasicsInternet Security Basics
Internet Security Basics
 
Java Cert Pki
Java Cert PkiJava Cert Pki
Java Cert Pki
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
SSL
SSLSSL
SSL
 
Session 10 Tp 10
Session 10 Tp 10Session 10 Tp 10
Session 10 Tp 10
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication Models
 
1205 bhat pdf-ssl
1205 bhat pdf-ssl1205 bhat pdf-ssl
1205 bhat pdf-ssl
 
presentation_finals
presentation_finalspresentation_finals
presentation_finals
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4
 
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
 
Lecture17
Lecture17Lecture17
Lecture17
 
Certification Authority - Sergio Lietti
Certification Authority - Sergio LiettiCertification Authority - Sergio Lietti
Certification Authority - Sergio Lietti
 
Lecture13certaficate.pdf
Lecture13certaficate.pdfLecture13certaficate.pdf
Lecture13certaficate.pdf
 
How to back up data.pptx
How to back up data.pptxHow to back up data.pptx
How to back up data.pptx
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...
 
SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications
 
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark CapturesSSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
 

Mehr von Puneet Arora

Mehr von Puneet Arora (15)

A beginners guide to YouTube Channel Set & Marketing
A beginners guide to YouTube Channel Set & Marketing A beginners guide to YouTube Channel Set & Marketing
A beginners guide to YouTube Channel Set & Marketing
 
Data-Visualization for Better Presentations
Data-Visualization for Better Presentations Data-Visualization for Better Presentations
Data-Visualization for Better Presentations
 
Primer On Man-Machine Reconciliation In Context of AI
Primer On Man-Machine Reconciliation In Context of AIPrimer On Man-Machine Reconciliation In Context of AI
Primer On Man-Machine Reconciliation In Context of AI
 
Primer on Supervised Learning and Unsupervised Learning Modelling for Non-Tec...
Primer on Supervised Learning and Unsupervised Learning Modelling for Non-Tec...Primer on Supervised Learning and Unsupervised Learning Modelling for Non-Tec...
Primer on Supervised Learning and Unsupervised Learning Modelling for Non-Tec...
 
Primer on Machine Learning for Non-Technical
Primer on Machine Learning for Non-Technical Primer on Machine Learning for Non-Technical
Primer on Machine Learning for Non-Technical
 
Primer On Data Visualization For Growth Minded People
Primer On Data Visualization For Growth  Minded People Primer On Data Visualization For Growth  Minded People
Primer On Data Visualization For Growth Minded People
 
Primer on Data Characteristics for Machine Learning For Non-Technicals
Primer on Data Characteristics for Machine Learning For Non-TechnicalsPrimer on Data Characteristics for Machine Learning For Non-Technicals
Primer on Data Characteristics for Machine Learning For Non-Technicals
 
Gig Based Career Options in Pandemic
Gig Based Career Options in Pandemic  Gig Based Career Options in Pandemic
Gig Based Career Options in Pandemic
 
Talk on kitchen gardening
Talk on kitchen gardeningTalk on kitchen gardening
Talk on kitchen gardening
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
Optimization of Cognitive Radio
Optimization of Cognitive Radio Optimization of Cognitive Radio
Optimization of Cognitive Radio
 
Career Orientation
Career OrientationCareer Orientation
Career Orientation
 
How to create Orkut kind of Website in ASP.NET
How to create Orkut kind of Website in ASP.NETHow to create Orkut kind of Website in ASP.NET
How to create Orkut kind of Website in ASP.NET
 
ER Diagrams Simplified
ER Diagrams SimplifiedER Diagrams Simplified
ER Diagrams Simplified
 
Data Flow Diagram
Data Flow DiagramData Flow Diagram
Data Flow Diagram
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Kürzlich hochgeladen (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 

X 509 Certificates How And Why In Vb.Net

  • 1.  
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Field Meaning Version Which version of X.509 Serial number This number plus the CA s name uniquely identifies the certificate Signature algorithm The algorithm used to sign certificate Issuer X.500 name of CA Validity Period The starting and ending period Subject name The entity whose key being certified Public Key The subject’s pubic key and ID of algorithm using it.
  • 12.
  • 13. Application Description Makecert Generate a X.509 certificate for testing purpose only Certmgr Assembles certificates into CTL (certificate trust list) and can also be used for revoking lists (CRLs). Chktrust Verifies the validity of a file signed with an X.509 certificate Cert2spc Creates, for test purposes only, a Software Publisher's Certificate (SPC) from one or more X.509 certificates.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.  
  • 19.  
  • 20.  
  • 21.  
  • 22.  
  • 23.  
  • 24.  
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.