> If the system is only for testing, or communicates with a limited number of 
> systems (i.e.,
> it is a firewalled backend system that only communicates with a front-end 
> system), then again,
> a self-signed certificate would be fine.

+1

> If his organization already uses PKI certificates, then he should follow the 
> rules
> established in his organization's Certificate Practice Statement, if it has 
> issued
> one.
>
> I do agree that if this is a public facing system, or one in an organization 
> with a large
> number of users that does not have its own CA infrastructure, then a 
> commercial certificate
> would be the best choice.

Commercial certificate authorities are actively targeted by hackers,
and when they are broken into, the trust each os has configured of
such certificates can cause issues. The recent google ssl certificate
issue shows what happens when things go wrong. If users will access
the site via a browser, then the browser warning will confuse
them/make them used to ignoring security warnings. For applications
communicating with each other, a self signed certificate will actually
be more secure than a certificate authority issued certificate -
assuming you trust your internal security more than you trust that of
a commercial certificate authority. It all depends on what the
certificate will be used for.

Chris

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to