Security | Cryptography

2020-03-19

Security

Authentication

Authorization

SiteMinder, Single Sign-On

HTTP authentication schemas

API Keys

JWT

ODIC

Integrated Windows Authentication (IWA)

Kerberos

LDAP

Links

Cryptography

hashing

example: python MD5

>>> hashlib.md5(b'bob').hexdigest()
'9f9d51bc70ef21ca5c14f307980a29d8'
>>> hashlib.md5(b'bob').hexdigest()
'9f9d51bc70ef21ca5c14f307980a29d8'

symmetric / asymmetric encryption

certificates: encrypted connections

For an secure connection between two nodes (e.g. client / server) we can use TLS (SSL). In order to accomblish this we need a few artifacts.

First of all we need a SSL certificate.

Signed certificate: In order to obtain a signed SSL certificate we can create a private key and a CSR with OpenSSL.

With the key file we create the CSR. And with the CSR in turn we can request a signed digital certificate from an CA.

For the key generation you can use a common public-key cryptosystem provided in OpenSSL.

Self-signed certificate is the counterpart of the CA signed certificate.

Here you just create your private key and your certificate. And use it for secure connection.

terminology