Reputation: 83
My requirement is to secure the REST webservice. After some discussion decided to go with PKI over oauth. The implementation will be in Java.
Now I have the following questions in mind?
If I enable SSL in my web server that just implements PKI infrastructure?
If I implement whatever is mentioned in this guide, that will take care of all encryption and decryption?. How the original messaged passsed between the servers are encrypted/decrypted?. Or this guide just talks about authorizing the client and nothing to do with the message passed?
If my above assumptions are wrong, Can you hep me in understanding, all I need to know about implementing this infrastructure?
Upvotes: 2
Views: 1287
Reputation: 81
Upvotes: 0
Reputation: 93978
Nope, it does not. Public key infrastructure is about the handling of the certificates (holding the public keys) and the private keys. You need to take care of certificate exchange, certificate lifetime, certificate revocation etc. etc. Of course, most of these are taken over by the Certificate Authority like Verizon. Even then, you need to protect and backup the private key you are using, and make sure it fits your server name, and that you update your certificate when it's time runs out.
Yes, the SSL/TLS protocol takes responsability of securing all the messages passed, at "transport level". You may of course require additional security at application level (e.g. to store send messages securily on the server). In general, SSL/TLS would suffice, and the implementation takes care of it all. You should however decide which SSL cipher suites you want to enable.
Um, I would suggest you read articles and books about PKI, and possibly some howto's from CA's. That question (and actually the two other questions) are off topic for stackoverflow. It's impossible to answer that in a few sentences.
Upvotes: 3