After you have a firm set of requirements,
focus on design. This determines how you\'re going to satisfy
requirements with least cost. The design should fully describe what
components and configurations are necessary to satisfy the
requirements. |
||||||||||
In a typical SSL installation, the server
maintains credentials so that clients can authenticate the server.
In addition to presenting a certificate at connection time, the
server also maintains a private key, which is necessary for
establishing that the server presenting a certificate is actually
presenting its own certificate. Cryptographic-acceleration cards
will generally store the key in hardware, making it unavailable to
the actual computer. |
||||||||||
In a typical SSL installation, the server
maintains credentials so that clients can authenticate the server.
In addition to presenting a certificate at connection time, the
server also maintains a private key, which is |
||||||||||
After you have a firm set of requirements,
focus on design. This determines how you\'re going to satisfy
requirements with least cost. The design should fully describe what
components and configurations are necessary to satisfy the
requirements. |
||||||||||
In a typical SSL installation, the server
maintains credentials so that clients can authenticate the server.
In addition to presenting a certificate at connection time, the
server also maintains a private key, which is necessary for
establishing that the server presenting a certificate is |
||||||||||