Re: authentication then authorization

2008-04-10 Thread Steffen DETTMER
* Kyle Hamilton wrote on Thu, Apr 10, 2008 at 02:34 -0700: > > (That means the CA remotely signs online submitted CSRs and sends > > back a Cert immediately? Maybe such a CA would not be that > > trustworthy...) > > First: it is as trustworthy as the application seems to > require. It's not

Re: authentication then authorization

2008-04-10 Thread Kyle Hamilton
On Thu, Apr 10, 2008 at 2:00 AM, Steffen DETTMER <[EMAIL PROTECTED]> wrote: > * Kyle Hamilton wrote on Wed, Apr 09, 2008 at 14:22 -0700: > > Each peer goes through this process: > > 1) peer creates a keypair > > 2) peer generates a CSR (certificate signing request) for its public key. > > 3) pe

authentication then authorization

2008-04-10 Thread Steffen DETTMER
* Kyle Hamilton wrote on Wed, Apr 09, 2008 at 14:22 -0700: > Each peer goes through this process: > 1) peer creates a keypair > 2) peer generates a CSR (certificate signing request) for its public key. > 3) peer connects to server, submits CSR along with whatever > information necessary to determin