O slideshow foi denunciado.
Seu SlideShare está sendo baixado. ×

Who are you? Authentication by certificates

Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio

Confira estes a seguir

1 de 33 Anúncio

Who are you? Authentication by certificates

Baixar para ler offline

Digital certificates have proved their worth as a strong means of authentication for decades. With IIoT taking center stage in industrial automation, machines need to be identified securely as well to stop illicit users or systems from sneaking in and potentially wreaking havoc in networks. X.509 certificates, coupled with communication protocols like OPC UA and hardware-based safe storage solutions like CmDongles, are ideal choices to meet the challenges of today.

Watch the webinar: https://youtu.be/E66Nvrjcwkw

Digital certificates have proved their worth as a strong means of authentication for decades. With IIoT taking center stage in industrial automation, machines need to be identified securely as well to stop illicit users or systems from sneaking in and potentially wreaking havoc in networks. X.509 certificates, coupled with communication protocols like OPC UA and hardware-based safe storage solutions like CmDongles, are ideal choices to meet the challenges of today.

Watch the webinar: https://youtu.be/E66Nvrjcwkw

Anúncio
Anúncio

Mais Conteúdo rRelacionado

Semelhante a Who are you? Authentication by certificates (20)

Anúncio

Mais de team-WIBU (20)

Mais recentes (20)

Anúncio

Who are you? Authentication by certificates

  1. 1. Who are you? Authentication by Certificates Stefan Bamberg | Senior Key Account Manager stefan.bamberg@wibu.com Philipp Luedtke| R&D Software philipp.luedtke@wibu.com Introduction to certificates Application Scenarios CodeMeter Certificate Vault
  2. 2. Who are you? 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 2
  3. 3. Proof of identity – Examples ▪ In certain situations, persons must identify themselves, i.e. you must prove your identity with legal certainty, e.g.: ▪ Police checks ▪ Opening a bank account ▪ Registration of a new vehicle ▪ Purchase of alcohol (proof of age) ▪ Check-in at airports ▪ And many more 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 3
  4. 4. Proof of identity – Process 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates Authority The ID document is issued Check of the ID document Proof of identity by identity document Result of the check Approval or Rejection 4
  5. 5. Proof of identity – Digital and automated? ▪ Authentication is essential for secure digital communication and secure networks ▪ Persons must authenticate themselves to machines and applications ▪ Machines must authenticate to other machines How do we make this work 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates ? 5
  6. 6. (X.509v3) Certificates Asymmetric Encryption 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates Digital Certificates PKI 6
  7. 7. Excursus: Asymmetric cryptography ▪ Symmetric Cryptography ▪ One key to encrypt and decrypt ▪ AES (Advanced Encryption Standard) is a symmetrical procedure ▪ Is used for large amounts of data thanks to its fast speed ▪ Asymmetric Cryptography = Public Key Cryptography ▪ Key pair: private and public keys ▪ It’s impossible to derive the private key from the public key ▪ RSA (named after Rivest, Shamir, and Adleman) is an asymmetrical procedure 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 7
  8. 8. Example: E-Mail encryption ▪ Use of asymmetric encryption ▪ Alice wants to send Bob an encrypted email ▪ Challenge: Key distribution ▪ Solution: Digital certificate 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates Alice Bob Bob‘s public key Encrypted with Bob‘s public key Bob‘s private key 8
  9. 9. What is a digital certificate? ▪ A digital certificate ▪ links identities with cryptographic keys ▪ contains information about an entity (process participant) ▪ contains the public key of the entity ▪ has a standardized structure (RFC 5280) ▪ comes with a signature calculated from the information the certificate holds ▪ can be checked for authenticity using cryptographic methods ▪ can be checked for integrity using cryptographic methods 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 9
  10. 10. Structure of an X.509v3 certificate ▪ A X.509v3 certificate includes among others the following elements: ▪ Version number and serial number ▪ Name of the issuer ▪ Name of the subject ▪ Period of validity ▪ Information on the holder's public key ▪ Information on the intended use of the certificate ("extensions") ▪ Digital signature ▪ Encryption algorithms used 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 10
  11. 11. Example: Certificate content (Demo) 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 11
  12. 12. Public Key Infrastructure (PKI)? Proof of identity – Analogue vs. digital 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates The ID document is issued The ID document is checked Result of the check Approval or Rejection The certificate is issued The certificate is checked Approval or Rejection Authority 12
  13. 13. Public Key Infrastructure (PKI) ▪ A PKI ▪ is actually an infrastructure – not just a software program ▪ consists of Certificate Authorities (CAs) (+ processes) ▪ is hierarchically structured as follows ▪ Root CA ▪ Derived subordinate CAs ▪ Every Certification Authority holds a key pair and a certificate ▪ issues and manages certificates 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 13
  14. 14. PKI Structure – Example 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates Root CA Sub-CA B Sub-CA A Sub-CA C issues end user certificate Self-signed Root certificate issues Sub-CA certificate 14
  15. 15. Example: Certificate Enrollment ▪ Certificate Enrollment 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates Root CA 1. Signed certificate request (CSR) Alice 3. Alice‘s certificate signed by the CA 2. Alice‘s identity is checked 15
  16. 16. Root CA Example: Certificate examination ▪ Certificate verification 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates Bob checks: 1. Do I trust the root CA of Alice? 2. Is the Root CA certificate valid? 3. Is Alice's certificate valid? Alice Bob Bob trusts 16
  17. 17. Application Scenarios 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 17
  18. 18. Application scenarios ▪ E-mail encryption / signature, document signature ▪ e.g. Microsoft Outlook, Mozilla Thunderbird, Adobe Acrobat, OpenOffice, … ▪ Securing communication on the web ▪ e.g., HTTPS or TLS, VPN, … ▪ Authentication on machines and applications ▪ e.g. Windows smart card logon, SSH, … ▪ Secure communication and authentication in industrial environments ▪ e.g. OPC UA, … 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 18
  19. 19. Challenges ▪ Rollout of certificates ▪ How is the authorization check performed? ▪ How is the technical rollout of certificates carried out? ▪ Where do I keep the keys safely? ▪ Withdrawal of certificates ▪ How is the authorization check performed? ▪ How is the certificate revocation made public? ▪ When to check the certificate revocation (Time of Revocation vs. Time of Check)? 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 19
  20. 20. CodeMeter Certificate Vault 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 20
  21. 21. Why CodeMeter Certificate Vault ▪ Simplification of the overall process of certificate usage ▪ Support of the standard interfaces PKCS#11, KSP, and OpenSSL ▪ Enrollment and update of keys/certificates via CodeMeter License Central online and offline ▪ Integration of CodeMeter License Central into existing certificate management systems via web service interfaces ▪ Storage of keys and certificates in a secure hardware anchor (Dongle) ▪ Storage of keys and certificates in a CmDongle embedding a security smart card chip (Infineon SLE97) 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 21
  22. 22. Application scenario: Industry ▪ Additional security in industrial environments ▪ OPC UA (Standard for platform-independent data exchange) 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 22
  23. 23. Secure anchor for keys and certificates 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates Several Form factors One Technology 23
  24. 24. Use of proven technology 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates ▪ License entry = Firm Code | Product Code ▪ Firm Code: assigned by Wibu-Systems ▪ Product Code: ▪ Chosen by the ISV ▪ 4 billion Product Codes (UInt32) ▪ Product Item Options: Each license can have combinable options ▪ Among others key and certificate storage Firm Code: 6.000.010 … Product Item Options Product Code: 201.000 Product Item Options Product Code: 201.001 Product Item Options Product Code: 201.002 24
  25. 25. Product Item Options © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates Text License Quantity Activation Time Expiration Time License Transfer Linger Time User Data Protected Data / Extended Protected Data Customer Own License Information Named User License Hidden Data Secret Data Usage Period Unit Counter Feature Map Maintenance Period Minimum Runtime Version 24.6.2020 Module Items 25
  26. 26. License Structure 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates FirmCode1 ProduktCode1 Secret data Protected data Product Item Option … ProduktCode2 … Secret data Protected data Product Item Option … 26
  27. 27. Storage of keys and certificates ▪ Using Product Codes you can store many keys and certificates on a single CmDongle: ▪ Copying is not possible because storage is happening in the smart card chip! ▪ Protected/Extended Protected Data for storing certificates ▪ Secret Data for key storage ▪ Cannot be read! ▪ Works only with the key ▪ Each Product Code represents a key/certificate via the parent Product Item Options ▪ Update of CmDongles possibile online and offline (for industrial setups) 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 27
  28. 28. Support of standard protocols ▪ CodeMeter Certificate Vault ▪ operates as a PKCS#11 compliant token provider ▪ can be integrated as Key Storage Provider (KSP) in the Microsoft Cryptographic API Next Generation (CNG) ▪ can be used with the OpenSSL API to securely store and use the keys of TLS certificates ▪ Integration in applications such as browsers, VPNs and e-mail clients is therefore already standard 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 28
  29. 29. Demo ▪ Authentication using PKCS#11 on a web page ▪ Creation of a certificate via OpenSSL ▪ Encryption of a file using OpenSSL 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates Demo 29
  30. 30. Integration in CA and rollout of certificates 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 30
  31. 31. Person/DeviceIssuer CodeMeter License Central – Ticket system for distribution 24.6.2020 Ticket + Fingerprint 4 Rollout 5 Ticket 2 Request 1Management system Software License Portal Ticket: ABCDE-12345-KLMNO-67890-UVWXY 3 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 31
  32. 32. Overview of CodeMeter Certificate Vault 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates ▪ Support of standard interfaces ▪ Simplification of the complex processes related to distribution and secure storage ▪ Use of the proven CodeMeter technology Legend: Turquoise: available 32
  33. 33. https://www.wibu.com info@wibu.com Europe: +49-721-931720 USA: +1-425-7756900 China: +86-21-55661790 Japan: +81-3-43608205 Thank You – Q&A 24.6.2020 © WIBU-SYSTEMS AG 2020 - Who are you? Authentication by Certificates 33

×