Cornell University SSL Certificate Service TSP Forum April 19, 2006 Andrea Beesing.

Slides:



Advertisements
Similar presentations
Creating an EDS Search Box Using EBSCO’s Search Box Builder Tool
Advertisements

SSL Implementation Guide Onno W. Purbo
Setting up Joshua Sanford David Sanchez.
SSLstrip Stepan Shykerynets
Lori Fitterling LI843 SSL Secured Sockets Layer. What is Secure Sockets Layer (SSL)? It is protection of data transferred over the Internet using encryption.
By: Hassan Waqar.  A PROTOCOL for securely transmitting data via the internet.  NETWORK LAYER application.  Developed by NETSCAPE.
Secure Sockets Layer eXtended (SSLX) Next Generation Internet Security Overview Presentation April 2011.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
PLEXIA Electronic Medical System
Electronic Transaction Security (E-Commerce)
Agenda Survey service transition and retirement Examining your survey needs Evaluating application features Service providers.
Online Security Tuesday April 8, 2003 Maxence Crossley.
Tom Parker Project Manager Identity Management Team IT Security Group.
The Pathway to Success Create Sycamore Express One-Stop Centers Goal 1 – Initiative 4.
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
Web Hosting and Domain Name Registration
Alpha Five User Group, Bill Parker, SSL Security and WAS, July 2007 SSL Security with Alpha Five App Server Protecting sensitive or personal data.
CSCI 6962: Server-side Design and Programming
COMP2121 Internet Technology Richard Henson April 2011.
Maximize Your Profits by. Open your eyes … How do you maximize profits? –Each StarterSSL sale = 10$ profit (based on normal buy price) –Each QuickSSL.
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties MORE, BETTER, SIMPLER Security Oded Gonda.
Book n Pay Book n Pay is online reservation system for travel and tourism industry which is well known as SRS or Synergy Reservation System. The purpose.
OPeNDAP Hyrax Back-End Server (BES) Authentication and Authorization Patrick West
Internet Trust Defined. Delivered. Electronic Business the Way It Was Meant to Be.
Quarterly Customer Meeting Active Directory Federation Services (ADFS) April 2015.
Being Ecommerce Sophon Thanasrivilai #100485
1 Using PKI for the Census MSIS 2004, Geneva Mel Turner, Lise Duquet Statistics Canada.
SE-2840 Dr. Mark L. Hornick1 Web Application Security.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
SE-2840 Dr. Mark L. Hornick1 Web Application Security.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Building Security into Your System Bill Major Gregory Ponto.
1 Care Management PCMH Committee Person Centered Medical Home July 17, 2013.
E-Michigan Web Development 1. 2 What Is It? A web based collaboration tool that is internal to state government and accessible only from within the state.
High Assurance / Enhanced Validation Name of Presenter: Kevin Brown Date: August 5th Confidential.
Browser User Certificate Mail Box VOMS-Admin Host Tomcat TR1) Users Trusts “VOMS-Admin” server identity. step1 TR2) User Trusts data (Data1, HTML response)
TrueBusinessID Multi Domain Process adding additional SANs after order.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Unlimited SSL and personal certificates at one annual fixed fee.
Secure Online Payment Presented by Tom Hun Web Developer.
Web SecurityIdentity Verification Services Signing Services Enterprise Security © 2007 GeoTrust, Inc. All rights reserved. How SSL is Changing to Increase.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
SECURITY ON THE WEB SITE Miguel Angel Vazquez Gonzalez.
SSL Certificates for Secure Websites Dan Roberts Kent Network Users Group Wednesday, 17 March 2004.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
Tech Data’s 2010 Physical Security Playbook Enablement for Networking Resellers.
Security Hannes Tschofenig. Goal for this Meeting Use the next 2 hours to determine what the security consideration section of the OAuth draft(s) should.
OGS Procurement Services Group 2007 State Purchasing Forum IT Procurement.
U.S. Energy Information Administration Independent Statistics & Analysis US. Energy Information Administration Cornell University April 4,
Maximize Your Hosting Business: Covering all your SSL requirements Tim Callan May 31, 2006 VeriSign / thawte Confidential.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
Setting and Upload Products
SSL Certificates for Secure Websites
Section 12.1 Section 12.2 Discuss the functions of a Web site
Service Owner: Andrea Beesing 9 February 2016
Chapter 8 Building the Transaction Database
Jim Fawcett CSE686 – Internet Programming Summer 2005
How to Check if a site's connection is secure ?
Topic 1: Data, information, knowledge and processing
Certificate Service Survey Summary
AD RMS Templates Active Directory Rights Management Services (AD RMS)
Certificate Revocation
FIS Bill Pay Certification Training Table of Contents
Electronic Payment Security Technologies
Presentation transcript:

Cornell University SSL Certificate Service TSP Forum April 19, 2006 Andrea Beesing

What is the service? On-site distribution of Geotrust 128-bit SSL server certificates for cornell.edu and nsdlib.org On-site distribution of Geotrust 128-bit SSL server certificates for cornell.edu and nsdlib.org CIT-subsidized subject to annual review CIT-subsidized subject to annual review Self-service model with backline consulting when needed Self-service model with backline consulting when needed Information and order form at: Information and order form at:

Factors driving use of SSL Users are required to authenticate to access the service Users are required to authenticate to access the service The service either displays or asks the user to provide information The service either displays or asks the user to provide information Protected by federal or state legislation Protected by federal or state legislation Considered sensitive or confidential Considered sensitive or confidential When the ability to confirm the authenticity of the server is a requirement When the ability to confirm the authenticity of the server is a requirement

Why offer the service? CCD request when Identity Management program first established CCD request when Identity Management program first established More recently, focus on data security in a highly decentralized environment More recently, focus on data security in a highly decentralized environment Customer convenience and cost-saving for Cornell overall Customer convenience and cost-saving for Cornell overall

Why Geotrust? Survey of campus net admins to start Survey of campus net admins to start RFP issued to five vendors: Verisign, Geotrust, Entrust, Thawte, Commodo RFP issued to five vendors: Verisign, Geotrust, Entrust, Thawte, Commodo CIT team reviewed responses and submitted follow-up questions CIT team reviewed responses and submitted follow-up questions Geotrust selected Geotrust selected Price Price Browser support Browser support Responsiveness Responsiveness Interest in higher education market Interest in higher education market

Other things you should know Knowledge of application, access to tools for generating CSR generally assumed Knowledge of application, access to tools for generating CSR generally assumed Geotrust certificates are recognized by all major browsers BUT Geotrust certificates are recognized by all major browsers BUT Geotrust certificates may not be recognized by all the applications you manage Geotrust certificates may not be recognized by all the applications you manage Check compatibility at: Check compatibility at: or check with us

Additional information Identity Management main web site: Identity Management main web site: Identity Management developer site: Identity Management developer site: Geotrust site: Geotrust site: Backline support: Backline