![](/images/backgrounds/125470/bg6d.png)
Mostimportantly, a certicate binds the owner's public key to the owner's identity. Like a
passportbinds a photograph to personal information about its holder, a certicate binds a
publickey to information about its owner.
Inaddition to the public key, a certicate typically includes information such as:
■Thename of the holder and other identication, such as the URL of the Web server using
thecerticate, or an individual's email address.
■Thename of the CA that issued the certicate.
■Anexpiration date.
DigitalCerticates are governed by the technical specications of the X.509 format. To verify
theidentity of a user in the certificate realm, the authentication service veries an X.509
certicate,using the common name eld of the X.509 certicate as the principal name.
AboutCerticate Chains
Webbrowsers are precongured with a set of root CA certicates that the browser
automaticallytrusts. Any certicates from elsewhere must come with a certicate chain to verify
theirvalidity. A certicate chain is series of certicates issued by successive CA certicates,
eventuallyending in a root CA certicate.
Whena certicate is rst generated, it is a self-signed certicate. A self-signed certicate is one
forwhich the issuer (signer) is the same as the subject (the entity whose public key is being
authenticatedby the certicate). When the owner sends a certicate signing request (CSR) to a
CA,then imports the response, the self-signed certicate is replaced by a chain of certicates. At
thebottom of the chain is the certicate (reply) issued by the CA authenticating the subject's
publickey. The next certicate in the chain is one that authenticates the CA's public key.
Usually,this is a self-signed certicate (that is, a certicate from the CA authenticating its own
publickey) and the last certicate in the chain.
Inother cases, the CA can return a chain of certicates. In this case, the bottom certicate in the
chainis the same (a certicate signed by the CA, authenticating the public key of the key entry),
butthe second certicate in the chain is a certicate signed by a dierent CA, authenticating the
publickey of the CA to which you sent the CSR. Then, the next certicate in the chain is a
certicateauthenticating the second CA's key, and so on, until a self-signed root certicate is
reached.Each certicate in the chain (after the rst) thus authenticates the public key of the
signerof the previous certicate in the chain.
About Secure SocketsLayerSecureSockets Layer (SSL) is the most popular standard for securing Internet communications
andtransactions. Web applications use HTTPS (HTTP over SSL), which uses digital certicates
toensure secure, condential communications between server and clients. In an SSL
connection,both the client and the server encrypt data before sending it, then decrypt it upon
receipt.
IntroductiontoCer ticatesand SSL
Chapter9 • Conguring Security 109