From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Device authentication

Device authentication

- [Instructor] While we focused so far on situations where users need to authenticate to a system, it's also true that systems sometimes need to authenticate to each other. Now, before we dive into some of the ways this can happen, let's first talk about how digital certificates can help users authenticate to systems. Then we'll move on to how they're used for device authentication. Digital certificates may be used as an authentication factor, providing a digital version of a something you have factor. Digital certificates may be used to connect to servers by SSH, to power smart cards, and to restrict network access to specific devices. When you use digital certificates for authentication, you create a digital certificate similar to the ones used to secure websites. The certificate's purpose is to provide a trusted copy of a public key to third parties. You retain the corresponding private key to prove that you're the owner of the public key. Now, let's talk about how we can use keys…

Contents