Managing PKI Authentication
Authentication is performed using the Public Key Infrastructure (PKI) credentials stored in the user's browser or on a device (such as a smart card or token).
By default, ActivID Appliance supports the following PKI-based authentication methods:
- PKI challenge/response for direct user authentication - the authenticating party signs a challenge. ActivID Appliance then validates the response using the end user’s reference credential (the public key certificate).
- PKI certificate check for indirect user authentication - a trusted system presents a public key certificate bound in ActivID Appliance to an end user. ActivID Appliance checks that the certificate is associated with the user and that the device and credential status are Active.
This authentication method assumes that the trusted system, for example a web server hosting the business application, has established a two-way SSL/TLS session with the user, thereby confirming that the user’s certificate is valid and that the user is in possession of the associated private key. - PKI certificate matching for indirect user authentication - similar to the PKI certificate check method except that the user's certificate is not stored or bound to the user in ActivID Appliance. Instead, at authentication, ActivID Appliance checks that the attributes of the certificate provided in the SSL/TLS session match the rules defined in the associated credential type.
Topics in this section