Oracle iPlanet Web Proxy Server 4.0.14 Administration Guide

Certificate-based Authentication

Authentication is the process of confirming identity. In the context of network interactions, authentication is the confident identification of one party by another. Certificates are one way of supporting authentication.

A certificate consists of digital data that specifies the name of an individual, company, or other entity, and certifies that the public key included in the certificate belongs to that entity.

Both clients and servers can have certificates. Server authentication refers to the confident identification of a server by a client. Identification of the organization assumed to be responsible for the server at a particular network address. Client authentication refers to the confident identification of a client by a server, or identification of the person assumed to be using the client software. Clients can have multiple certificates, much like a person might have several different pieces of identification.

A certificate is issued and digitally signed by a Certificate Authority, or CA. The CA can be a company that sells certificates, or a department responsible for issuing certificates for your company’s intranet or extranet. You decide which CAs you trust enough to serve as verifiers of other people’s identities.

A certificate includes the following information.


Note –

A server certificate must be installed before encryption can be activated.