|
|
|
|
Now you can get technical
After you have a firm set of requirements, focus on design.
This determines how you're going to satisfy requirements
with least cost. The design should fully describe what
components and configurations are necessary to satisfy
the requirements.
Through the design process, produce
a design specification that highlights the chosen design
elements and provides a diagram indicating the placement
of access points within the facility. For smaller
networks, you may only spend a day or so designing the
solution. In larger implementations, it may take weeks
or months to fully define enough technical detail before
moving forward with the acquisition of hardware and
installation services. These larger projects will likely
benefit from simulation, prototyping, or pilot testing
as part of the design to ensure you've made the right
choices and the requirements are fully
realizable.
Keys in the Clear
In a typical SSL installation, the server maintains
credentials so that clients can authenticate the server.
In addition to presenting a certificate at connection
time, the server also maintains a private key, which is
necessary for establishing that the server presenting a
certificate is actually presenting its own certificate.
Cryptographic-acceleration cards will generally store
the key in hardware, making it unavailable to the actual
computer.
|
|
|
|
|
|