Esc
Certificate-based Authentication
Definition
Requiring a digital certificate in order to authenticate a user.
How it works
Certificate-based authentication is a security mechanism that uses digital certificates to verify the identity of a user, device, or server before granting access to a network or system. This method relies on a pair of cryptographic keys: a public key and a private key.
Considerations
- Private Key Protection: Ensure that private keys are securely stored and protected against unauthorized access.
- Certificate Revocation: Implement a robust process for revoking certificates if they are compromised or no longer needed.
- Man-in-the Middle Attacks: Use mutual authentication to mitigate the risk of these attacks.
loading...
loading...
References
All
Guideline
The following references were used to develop the Certificate-based Authentication knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)
Federal Public Key Infrastructure 101
Reference Type: Guideline Author: Identity, Credential, and Access Management Subcommittee (ICAMSC)
D3FEND™
A knowledge graph of cybersecurity countermeasures