× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Hi,

Normally in SSL applications, certificates are verified by checking to see
who "signed" them.  If the certificate authority who signed the
certificate is trusted by the application, it will allow the certificate.

In places like the internet, it's not practical to keep a database of
every possible certificate to see if it's valid, and/or delete it when you
want to revoke it.    Just imagine if every web browser needed to contain
a copy of every possible web server's SSL certificate!

Anyway...   by issuing each user a certificate signed by your own personal
certificate authority -- and configuring your iSeries telnet server to
only trust certificates signed by your iSeries -- you've made your system
significantly more secure.   Now only users that you've issued
certificates to can connect.   That's great!

If someone leaves the company, they can still connect, it's true.
They'll get a sign-on screen.   But, if you disable their user profile,
how will they log in?

but, if you don't want them to even be able to try userids and passwords,
you can extend the security of your system using a "Telnet Device
Initialization Exit Program".  In that program, you can write code that
examines the certificate that they've presented.  I see no reason why you
couldn't write code to check if they're still an active user, and if not,
deny access.



On Fri, 4 Apr 2003, Sean Porterfield wrote:

> Has anyone successfully implemented client authentication?  I know it gets
> brought up occasionally, but I couldn't find any details in the archives.
>
> I found the message Scott Klement sent referring me back to the one I sent
> that has a link to IBM.  FYI, the procedure has changed since then!  We are
> on V5R1 now, and to force client authentication you need to use DCM
> application configuration.
>
> I created a certificate authority and certificate.  Assigned the certificate
> to the services I wished.  Turned on "require client authentication" and
> restarted telnet.  I was denied a signon screen (finally!)
>
> Then I created a user certificate, installed it in my browser, exported to a
> file, imported into key manager.  I may have had to reboot at this point,
> but after specifying "Use default" under client certificate, I got a signon.
> So far, so good.
>
> Then I went back to DCM and removed the assignment of the certificate to the
> user.  No change - still get a signon.  So I deleted the certificate (just
> to confuse the issue, I had created 2 certificates, so it seems I used
> "remove" for one and "delete" for the other.)  No change, still able to get
> a signon with the deleted certificate.  Ended and started telnet to be sure,
> no effect.  Even rebooted, not that it should matter since I'm trying to get
> the AS/400 to do the verification.
>
> Is this correct behavior?  Once genereated, the AS/400 will trust the
> certificate until expired even though it's been deleted?  Doesn't do much
> for our security plan...
>
> I have a few more docs to read, but if the above doesn't generate any
> obvious answers, the next step appears to be enabling CRL and figuring out
> how to publish the CRL to the LDAP server.  Then figure out how to revoke a
> certificate.  And decide how to create certificates for all the users.
>
> Luckily, I have a backup system to work on for testing, but I need to get
> this going in production ASAP.
>
> Any ideas will be greatly appreciated.  I've already skimmed through the
> obvious Redbooks (Tips and Tools for Securing your iSeries, Deploying a
> Public Key Infrastructure, Developing a Digital Certificate Infrastructure,
> iSeries Security Reference)
>
> Thanks!
>
> _______________________________________________
> This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
> To post a message email: MIDRANGE-L@xxxxxxxxxxxx
> To subscribe, unsubscribe, or change list options,
> visit: http://lists.midrange.com/mailman/listinfo/midrange-l
> or email: MIDRANGE-L-request@xxxxxxxxxxxx
> Before posting, please take a moment to review the archives
> at http://archive.midrange.com/midrange-l.
>

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.