PKI In-depth
PKI In-depth
Infrastructure
In-depth
Presentation by the Cyber
Team
Introduction to PKI
Note: The keys generated in this process are in their raw form and not encrypted. While the public
key does not need to be encrypted as it is shared freely with other entities that they themselves can
use to sign data that is only meant for the applying entity to receive, it is advised for the applying
Submitting the CSR to the CA
Upon receiving the signed digital certificate, the entity then installs
the certificate on the server or device where it will be used.
The process typically involves copying the certificate file into the
server/device and configuring the server software (e.g., Apache,
Nginx) to use it. Server configuration can involve specifying the path
to the certificate file in the server's configuration files.
After configuring the server software, it's often necessary to restart
the server to apply the changes and use the new certificate file for
encrypted connections.
Testing will then be done to ensure that the encrypted connections are
working properly. This can be done by accessing the server via HTTPS
and checking for any browser warnings or errors.
Certificate Revocation Checking