I have been working at home now for almost eleven years. When my job first started, it was the first time that a software developer worked remotely in my company. There were many barriers before this time but luckily my…
I have been working at home now for almost eleven years. When my job first started, it was the first time that a software developer worked remotely in my company. There were many barriers before this time but luckily my…
Public keys that reside inside certificates are only meant to be used for certain things. This is indicated by the Key Usage and Extended Key Usage extensions. The first stop is documentation from OpenSSL. Key usage supported names: digitalSignature nonRepudiation…
There are many different kinds of certificate authorities available. A description from Windows 2000 Server documentation helps to clarify. The different players are: Root CA Subordinate CA Intermediate CA Issuing CA The CA hierarchies are very flexible based on simple…
How do you exchange secrets without knowing the codes to use? Typically it is a recursive kind of problem. With the classic mode of symmetric encryption keys, it is necessary to magically transport the key to the other side. This…
Part two continues on the topic of digital certificates. One of the keys is private and the other is public. Below are some useful examples and explanations from Novell: But, how does this work on the Internet for transactions?
This post will explore digital certificates. Consider this as a result of a need to learn more detail about how certificates work. Start here: VeriSign: Introduction to Digital Certificates VeriSign: Introduction to Public Key Cryptography Paraphrasing: Cryptography solves many key…
Active Directory Federation Server (ADFS) runs on IIS web server. At first it appeared to be a bit mysterious how this was laid out but it is now obvious that it follows the rules of a typical Microsoft ASP.NET web…
XML can be hard to read without any formatting. The computer could care less but human eyes cannot easily see the patterns. This recently became obvious with the FedUtil program that comes with Windows Identity Foundation. All the XML ends…
Have you ever wondered what it would be like to work from home? Do images of stuffing envelopes or selling catalog items on the party plan come to mind? Ten years ago I signed a contract to work for Citrix.…
A few years ago, I participated in a seminar about creativity. Since then there have been several email updates about creativity in the business world. From the latest email, there was a link to a speech from Elizabeth Gilbert. You…