Yearly Archives: 2010

Certificate Public Key Usage

Public keys that reside inside certificates are only meant to be used for certain things.  This is indicated by the Key Usage and Extended Key Usage extensions. The first stop is documentation from OpenSSL. Key usage supported names: digitalSignature nonRepudiation

Tagged with: , ,
Posted in Certificates, PKI

Certificate Authority Trust Model

There are many different kinds of certificate authorities available.  A description from Windows 2000 Server documentation helps to clarify.  The different players are: Root CA Subordinate CA Intermediate CA Issuing CA The CA hierarchies are very flexible based on simple

Posted in Uncategorized

SSL Handshake

How do you exchange secrets without knowing the codes to use?  Typically it is a recursive kind of problem.  With the classic mode of symmetric encryption keys, it is necessary to magically transport the key to the other side.  This

Tagged with:
Posted in SSL

Digital Certificates (part 2 of 2)

Part two continues on the topic of digital certificates.    One of the keys is private and the other is public. Below are some useful examples and explanations from Novell: But, how does this work on the Internet for transactions?

Tagged with: ,
Posted in Certificates, PKI

Digital Certificates (part 1 of 2)

This post will explore digital certificates.  Consider this as a result of a need to learn more detail about how certificates work. Start here: VeriSign: Introduction to Digital Certificates VeriSign: Introduction to Public Key Cryptography Paraphrasing: Cryptography solves many key

Tagged with: , ,
Posted in Certificates, Security, SSL

ADFS 2.0 Master Page

Active Directory Federation Server (ADFS) runs on IIS web server. At first it appeared to be a bit mysterious how this was laid out but it is now obvious that it follows the rules of a typical Microsoft ASP.NET web

Posted in ADFS, ASP.NET

One line XML files

XML can be hard to read without any formatting. The computer could care less but human eyes cannot easily see the patterns. This recently became obvious with the FedUtil program that comes with Windows Identity Foundation. All the XML ends

Tagged with:
Posted in Uncategorized

Working From Home 2010

Have you ever wondered what it would be like to work from home?  Do images of stuffing envelopes or selling catalog items on the party plan come to mind? Ten years ago I signed a contract to work for Citrix.

Posted in Work From Home

Ego-less Genius

A few years ago, I participated in a seminar about creativity.  Since then there have been several email updates about creativity in the business world.  From the latest email, there was a link to a speech from Elizabeth Gilbert.  You

Posted in Ideas, Observations, Video

Choice Paradox

Now and then an author writes about something that starts off being counter-intuitive.  Barry Schwartz wrote the book, “The Paradox of Choice”, to address the misconceptions about the process of making a decision.  In most modern societies, it is perceived that

Tagged with:
Posted in Book Analysis, Observations
Archives
Categories
Follow Red Circle Blog on WordPress.com