McAfee EPOCDE-AA-BA Product Guide - Page 58

Authenticating with certificates, When to use certificate authentication

Page 58 highlights

7 Configuring advanced server settings Authenticating with certificates Authenticating with certificates Client-side certificate authentication allows a client to use a digital certificate as their authentication credentials when logging on to an ePolicy Orchestrator server. This chapter details how and when certificate authentication should be used. Contents When to use certificate authentication Configuring ePolicy Orchestrator for certificate authentication Uploading server certificates Removing server certificates Configuring users for certificate authentication Problems with certificate authentication When to use certificate authentication Certificate authentication is the most secure method available. However, it is not the best choice for all environments. Certificate authentication is an extension of public-key authentication. It uses public keys as a basis, but differs from public-key authentication in that you only need to trust a trusted third party known as a certification authority (or CA). Certificates are digital documents containing a combination of identity information and public keys, and are digitally signed by the CA who verifies that the information is accurate. Advantages of certificate-based authentication Certificate-based authentication has a number of advantages over password authentication: • Certificates have predefined lifetimes. This allows for a forced, periodic review of a user's permissions when their certificate expires. • If a user's access must be suspended or terminated, the certificate can be added to a certificate revocation list, or CRL, which is checked on each logon attempt to prevent unauthorized access. • Certificate authentication is more manageable and scalable in large institutions than other forms of authentication because only a small number of CAs (frequently only one) must be trusted. Disadvantages of certificate-based authentication Not every environment is best for certificate-based authentication. Disadvantages of this method include: • A public-key infrastructure is required. This can add additional cost that in some cases may not be worth the additional security. • Additional overhead in maintaining certificates is required when comparing to password-based authentication. Configuring ePolicy Orchestrator for certificate authentication Before users can log on with certificate authentication, ePolicy Orchestrator must be configured properly. Before you begin You must have already received a signed certificate in P7B, PKCS12, DER, or PEM format. 58 McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328

Authenticating with certificates
Client-side certificate authentication allows a client to use a digital certificate as their authentication
credentials when logging on to an ePolicy Orchestrator server.
This chapter details how and when certificate authentication should be used.
Contents
When to use certificate authentication
Configuring ePolicy Orchestrator for certificate authentication
Uploading server certificates
Removing server certificates
Configuring users for certificate authentication
Problems with certificate authentication
When to use certificate authentication
Certificate authentication is the most secure method available. However, it is not the best choice for all
environments.
Certificate authentication is an extension of public-key authentication. It uses public keys as a basis,
but differs from public-key authentication in that you only need to trust a trusted third party known as
a
certification authority
(or CA). Certificates are digital documents containing a combination of identity
information and public keys, and are digitally signed by the CA who verifies that the information is
accurate.
Advantages of certificate-based authentication
Certificate-based authentication has a number of advantages over password authentication:
Certificates have predefined lifetimes. This allows for a forced, periodic review of a user's
permissions when their certificate expires.
If a user's access must be suspended or terminated, the certificate can be added to a
certificate
revocation list
, or CRL, which is checked on each logon attempt to prevent unauthorized access.
Certificate authentication is more manageable and scalable in large institutions than other forms of
authentication because only a small number of CAs (frequently only one) must be trusted.
Disadvantages of certificate-based authentication
Not every environment is best for certificate-based authentication. Disadvantages of this method
include:
A public-key infrastructure is required. This can add additional cost that in some cases may not be
worth the additional security.
Additional overhead in maintaining certificates is required when comparing to password-based
authentication.
Configuring ePolicy Orchestrator for certificate authentication
Before users can log on with certificate authentication, ePolicy Orchestrator must be configured properly.
Before you begin
You must have already received a signed certificate in P7B, PKCS12, DER, or PEM format.
7
Configuring advanced server settings
Authenticating with certificates
58
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide