PKI Bootcamp - Basics of Certificate Issuance

Поделиться
HTML-код
  • Опубликовано: 20 авг 2024
  • This video provides a high level look at how certificates are signed and a certificate chain is created.

Комментарии • 39

  • @AliBaba-vw7mo
    @AliBaba-vw7mo 4 года назад +2

    So far, I have not seen a single video that explains so far up the trust chain. Thanks!

  • @vak21
    @vak21 4 года назад +6

    Excellent explanation, clear, detailed, and covering many open questions that had been bothering me for a long time.

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 года назад

      Thank you very much for the feedback, Jose. I really appreciate it.

  • @chandankundapur
    @chandankundapur 4 года назад +3

    Echo what everyone else has mentioned here . Extremely useful . Thanks much Paul for your time in creating these videos

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 года назад +1

      Thank you for taking the time to give your positive feedback, Chandan. I really appreciate it.

  • @eddierouth
    @eddierouth 4 года назад +2

    Explained very well, loved your way of teaching .. please add more videos. Appreciate for your effort Paul.

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 года назад

      Thanks for taking the time to provide your feedback, Indranil. I hope yo do a few more videos soon.

  • @jesuschrist5405
    @jesuschrist5405 Год назад +1

    Excellent master for PKI

  • @irfan_b5186
    @irfan_b5186 3 года назад +1

    Fantastic work Paul.. really appreciated

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 года назад

      I'm glad you like it, Irfan. Thanks for taking the time to write a comment!

  • @GNSK3
    @GNSK3 11 месяцев назад

    Thank you so much. Great explanation.

  • @frankkolmann4801
    @frankkolmann4801 3 года назад +1

    I have never trusted public/private keys, simply because how private can you make a key private. Government level security agencies can simply say give us your private keys and BOOM nothing is secure. Thanks for the video.

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 года назад

      Hi, Frank. You bring up a fairly complicated but important topic. I believe we can trust private keys (as a technology). There are risks related to the security of private keys, however, I believe those risks exist with any technology, and even with data itself. For example, even if I could prevent a government agency from getting access to the TLS private key(s) I use to protect my data, the government can simple tell me to give them the data. If I store the private key(s) in a FIPS hardware device, I may be able to protect them better but then the thing I need to protect is the credentials I use to access the device. I’m providing a bit of an abbreviated response but hope that helps. Thanks a bunch for your comment.

  • @maurod6180
    @maurod6180 3 года назад +1

    THANK YOU!!!!! thank you very much!

  • @abhishekyadav0007
    @abhishekyadav0007 6 лет назад

    Thanks again Paul..well explained

    • @PaulTurnerChannel
      @PaulTurnerChannel  6 лет назад

      Thank you very much, Abhishek. I hope to get more videos out soon (been too busy with the day job :)

  • @TheGPification
    @TheGPification 7 лет назад

    very well explained, Paul!

  • @CKZA10
    @CKZA10 3 года назад +2

    Hi Paul and everyone. I was looking at the X509 RFC (5280) and was wondering if your CA1 can be called the Registration Authority?

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 года назад +1

      Sorry for the slow response. The actual CA at CA1 can’t be called an RA because it is signing certificates. RAs do not sign certs. However, the RA function is often performed as part of the CA organization. For example, if CA1, Inc. is running a CA, they will perform the RA function to validate that all requesters are authorized to request certs for their domains. CA1, Inc. acts as both the CA and RA.
      The most common case where the RA function is separate is when a corporation is requesting certs for their sub domains. For example, Corp1 goes to CA1, Inc. and says they want to issue certs for a bunch of severs under corp1.com. CA1 acts as the RA to confirm that Corp1 owns corp1.com. Then, if a user at Corp1 requests a cert for finance.corp1.com, an admin at Corp1 will review and approve the request in the CA1 console. In this case, CA1, Inc is the CA and Corp1 is the RA. Hope that helps.

    • @CKZA10
      @CKZA10 3 года назад

      @@PaulTurnerChannel Thanks Paul. The drawing in the RFC stated that the RA "publishes cert" so I assumed wrongly its function or intent. All clear now. I'm studying ISAKMP now for CCNP and came upon your excellent videos (which helped on the certificate aspect). Reall appreciate your time with this.
      Do you know by chance where I can get more details on COOKIES in IKEv1 Phase 1? Way off topic but at the end of Phase 1 IKEv1 there's SKEYID and SKEYID_e,d,a. It's generated using DH(secret) and then it says CKY_I and CKY_R (cookie initiator and responder). I can't seem to find an "English" explanation on what the cookies consist of lol.

  • @AxelSchwab94
    @AxelSchwab94 4 года назад +1

    thank you for your effort, really cool; how has you made the animations?

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 года назад +1

      Thanks for your feedback. I use PowerPoint.

    • @AxelSchwab94
      @AxelSchwab94 4 года назад

      Paul Turner nice than we have the same Approach to explain thinge, but you habe the cooler pp

  • @JeremyMcBane
    @JeremyMcBane 4 года назад +2

    3/13/37 I see what you did there

  • @UmerShabibMohd
    @UmerShabibMohd 5 лет назад

    Could you share the PDf of the slide

    • @PaulTurnerChannel
      @PaulTurnerChannel  5 лет назад

      Hi, Umer. I'm not aware of a way to attach the file to RUclips video for download. Since this is technically Venafi content, I'm checking with them to see how it can be made available. I'm glad that it is useful enough that you'd like the PDF. Thanks for reaching out.

    • @PaulTurnerChannel
      @PaulTurnerChannel  5 лет назад

      Umer, sorry for the delay in getting back to you. The PDF has been uploaded to following address (updated with the newer Venafi PPT template :):
      www.venafi.com/resource/pki-bootcamp-basics-of-certificate-issuance-presentation
      Please confirm that you are able to access it.

    • @basantsherwida4586
      @basantsherwida4586 Год назад

      @@PaulTurnerChannel thanks for sharing the slides , but the access to it is denied via your link :(

    • @PaulTurnerChannel
      @PaulTurnerChannel  Год назад

      Umer, the slides were shared with you three years ago. I am no longer with Venafi and I assume they’ve taken that link down. Sorry.

    • @basantsherwida4586
      @basantsherwida4586 Год назад

      that's fine, no matter.
      its a great series videos by the way

  • @chrisadams27
    @chrisadams27 2 года назад +1

    Guys with guns? Please...

    • @PaulTurnerChannel
      @PaulTurnerChannel  2 года назад

      Haha. I guess I do have a flair for the dramatic every once in a while. Good catch 😀

    • @chrisadams27
      @chrisadams27 2 года назад

      @@PaulTurnerChannel great vid though, thanks

    • @PaulTurnerChannel
      @PaulTurnerChannel  2 года назад

      Thanks, Chris. I’m glad you liked it.