Electronics Home»Top Flaws in Distributed Authentication Systems and how they are Attacked, High Tech, Page 38

Top Flaws in Distributed Authentication Systems and how they are Attacked, High Tech, Page 38

Top Flaws in Distributed Authentication Systems and how they are Attacked

Share  Email
  Page: 38
See entire paper: http://electronics.wesrch.com/pdfEL11TZ3XNMONP
Page URL: http://electronics.wesrch.com/38-pdfEL11TZ3XNMONP
Note : Best viewed in FF3 or above, IE7 or above
Page(s): 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64
 
Page content:

Few know what an Enterprise CA is or how
to set one up

Two consequences. Either:

1. The same certificates are used in development
and production, giving every dev, tester and
anyone with source access the ability to
impersonate the production federation
authority. Or:

2. Certificate validation code is turned off for
development and test. (Who wants to pay for
“real” certs there?) And is never turned back
on in production…
Insert presenter logo
here on slide master.
See hidden slide 2 for
directions

 

 
Subscribe
x