First page Back Continue Last page Overview Graphics
The TLS(SSL) approach
I generate a private key on my system.
I send my public key plus my identity in the form of a certificate signing request (CSR) to a certificate authority (CA).
The CA performs some sort of validation to insure that I am who I say I am.
They sign a certificate containing my public key, my domain name, and and expiration date.
I install the certificate on my server.