> I've been building a small https client & everything has gone quite well.
> Now I've been told that I need to include support for client authentication
> using a standard x.509 certificate & I am stumped.

How do you manage client trust to your server? how do you know
that you are really communicating in a confidential way with the
intended server?

Is there a configuration file with 'trusted CAs or server certs', etc?, 

> 
> Is the certificate just going to be a file? Do I just have to set a path to
> it, or is there some sort of installation that I need to do?
It depends what kind of https client software you are building. 

> 
> As you can tell, I'm at a real basic level with this one. I've looked at the
> command line tool documentation, but I don't know what I'm looking for.
You can for example (mis)use a PKCS12 file containing a user key-pair/cert and
even some trust base.

For example, if you want to make a simple client/server protocol based on
https between some client software and one service, where each user has
access to his/her server, you could use a file (or a hardware token) with
three things:

  - a key/pair for the user,
  - a corresponding cert
  - a cert of the server containing a service URL somewhere.

This file completely describes the information concerning a user.
(The client software may need one configuration parameter about
 https proxies, this might be handled independantly from the
 user parms and considered as a parameter of the workstation and
 not of the USER.)

Peter Sylvester
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to