> From: Michael DeMond [mailto:mich...@dragonspark.us]
> 
> You have mentioned StartSSL twice now and after taking a look into it, it does
> look promising.  I basically need a signed certificate from them, one that
> would allow me to specify the serial number and/or extensions, and I will be
> good to go.

Here is a step-by-step guide that I wrote:
http://downloads.conceptblossom.com/synctuary/Trusted_Cert_StartSSL.pdf

Unfortunately, it's out of date, as they've updated their website a few weeks 
ago, but conceptually it should be the same. If you complete up to page 19, you 
have created an identity cert, which is used to authenticate to their webpage. 
For an example, quit out of IE and browse back there again. When you click 
Authenticate, then the OS will prompt you, "Do you want IE to access your cert?"

I have another guide somewhere for Firefox, Chrome, and Safari, but the process 
is the same. It's just different browser dialogues.

This process might be enlightening to you, but I don't think it's likely to 
help you with your Azure thing. Because the the page you referenced was 
specifically Azure AD, I expect the Azure solution will involve creating a 
Microsoft Certificate server (CA) and registering user certs or device certs to 
user and computer accounts in AD.


> I am interested in hearing about asymmetric keys, but I do not think that

You're already familiar with asymmetric keys, if you use ssh with key 
authentication. ssh-keygen (unix/linux) or puttygen (in windows) allows you to 
generate a public/private keypair, and then you upload the public key to the 
server somehow, and then your client is able to authenticate automatically 
using the private key.

Good luck.  :-)

Reply via email to