First page Back Continue Last page Overview Graphics
The TLS(SSL) approach
- I generate a private key on my system.
- I send my public key plus my identity in the form of a certificate signing request (CSR) to a certificate authority (CA).
- The CA performs some sort of validation to insure that I am who I say I am.
- They sign a certificate containing my public key, my domain name, and and expiration date.
- I install the certificate on my server.