Hello,
> OK, perhaps I need to explain this more.  I have a client cert
> scenario where in order to verify the client's identity a certificate
> is used instead of a username / password.  I would not like for anyone
> to be able to just grab the client certificate and impersonate, so I
> would like to add a password to the cert.  I would think this would be
> similar to where for instance Verisign sends you a certificate for
> your webserver, and it has a password on it.  Am I mistaken?
Certificate is your public key signed by CA (this adds to this
"anonymous" two numbers your "personal" information).
But your public key comes from generated RSA key pair before
(this RSA key pair has public and private key).
Certificate is public, your RSA key is private.
When somebody wants to verify your identity, then you
send him your certificate and some data signed by your
private RSA key. Your peer has to:
 - verify your certificate (with CA cert)
 - check your signed data (to verify that you have
   corresponding private key (to certificate)).

This method is used in SSL/TLS to verify client identity.
In short: you prove your identity signing some data
with your secret private key. Certificates are used
by other peers to send some encrypted data to you
or your signature check. (after verifying your cert with CA cert).

Best regards,
-- 
Marek Marcola <[EMAIL PROTECTED]>

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to