This document provides an overview of how to use the Secure Sockets Layer (SSL) with your Java Web Server. It describes the features provided to you using SSL, and identifies some common administrative procedures:
When you configure the Secure Web Page Service in your Java Web Server, you are configuring a web server to use SSL. This protocol combination is called "HTTPS" (HTTP with SSL).
The Secure Sockets Layer (SSL) is a general purpose network security protocol. In its normal usage, SSL provides up to four features to your TCP connections:
There are several different ways to use SSL. In particular, each of the four features above comes in several varieties, and all except integrity protection are optional.
To set up your secure web page service, do the following:
/server_root/public_html
).
Note that if your server is running on a UNIX system,
and you choose the standard HTTPS port (443), you must start
your server as root. After you have started the server, you
may not want to continue to run server as root; for more information,
see Installation and Startup
to find out how to tell the server not to run as root.
Using a Certificate Authority
Most secure web servers authenticate themselves using a certificate provided by a trusted "Certificate Authority" (CA). The role of a CA is to provide introductions between parties who don't know each other; they authenticate addresses according to policies specified in a "Certification Practices Statement" (CPS) which are intended to support use of these certificates (with digital signatures) as evidence in court cases.
When a CA is used, a client using a web browser does not need to get a copy of the server's certificate except through using the SSL protocol.
If you want to use SSL with a CA, do the following:
authstore
command to generate a
self-signed certificate.
-----BEGIN CERTIFICATE----- MIICZTCCAdICBQL3AAC2MA0GCSqGSIb3DQEBAgUAMF8xCzAJBgNVBAYTAlVTMSAw HgYDVQQKExdSU0EgRGF0YSBTZWN1cml0eSwgSW5jLjEuMCwGA1UECxMlU2VjdXJl IFNlcnZlciBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NzAyMjAwMDAwMDBa Fw05ODAyMjAyMzU5NTlaMIGWMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZv cm5pYTESMBAGA1UEBxMJUGFsbyBBbHRvMR8wHQYDVQQKExZTdW4gTWljcm9zeXN0 ZW1zLCBJbmMuMSEwHwYDVQQLExhUZXN0IGFuZCBFdmFsdWF0aW9uIE9ubHkxGjAY BgNVBAMTEWFyZ29uLmVuZy5zdW4uY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB iQKBgQCofmdY+PiUWN01FOzEewf+GaG+lFf132UpzATmYJkA4AEA/juW7jSi+LJk wJKi5GO4RyZoyimAL/5yIWDV6l1KlvxyKslr0REhMBaD/3Z3EsLTTEf5gVrQS6sT WMoSZAyzB39kFfsB6oUXNtV8+UKKxSxKbxvhQn267PeCz5VX2QIDAQABMA0GCSqG SIb3DQEBAgUAA34AXl3at6luiV/7I9MN5CXYoPJYI8Bcdc1hBagJvTMcmlqL2uOZ H9T5hNMEL9Tk6aI7yZPXcw/xI2K6pOR/FrMp0UwJmdxX7ljV6ZtUZf7pY492UqwC 1777XQ9UEZyrKJvF5ntleeO0ayBqLGVKCWzWZX9YsXCpv47FNLZbupE= -----END CERTIFICATE-----
Additional Certificate Authorities Support Support for additional Certificate Authorities (CA's) is now available. To use a CA other than the built-in VeriSign CA's:
You need to generate a self-signed certificate for two reasons. One is if you do not intend to use a Certificate Authority; this option is strongly discouraged. The other is that it is part of the process currently used to get a certificate created by a certificate authority.
Note that not all web browsers currently support self signed certificates well. Netscape Navigator 3.0 does, as does HotJava, but Internet Explorer does not.
To create a self-signed certificate, do the following:
authstore
command to generate a
self-signed certificate.
Most web browsers do not support unauthenticated servers. This is intentional, since the unauthenticated flavors are open to "person in the middle" attacks. That is, since the server's public key is not authenticated, clients can't know if they're really talking to the server they think they are.
To set up your Secure Web Page Service to support these flavors, do the following:
Top java-server-feedback@java.sun.com |
Copyright © 1997
Sun Microsystems, Inc. All Rights Reserved. |