MiVoice MX-ONE TLS/SSL - End-User Workshop
Internet communication via https (http over TLS) has been standard for years and is no longer the exception. TLS serves as an "encryption layer" to protect communication from unintentional eavesdropping. Many other protocols (including SIP) can use this "encryption layer". While using TLS is very simple, the configuration is complex and anything but trivial. It requires knowledge of asymmetric encryption, hash functions, the RSA cryptosystem, certificate authorities, certificate chains, etc.There are many questions: what needs to be prepared to get a certificate, what exactly is a certificate, how does it work, where do I get it, what do I get from the certificate authority, where do I place it, what material is confidential and what is not.This course provides comprehensive understanding and background knowledge and gives comprehensive answers to the above questions.
Technical staff from
- Enterprise networks responsible for network integration, operation and maintenance.
- Infrastructure and terminal equipment suppliers.
- Software companies and measurement suppliers responsible for development, production, quality monitoring, service and documentation.
ILL / RLL
If you want to participate remotely, please note the following technical requirements.
- Equipment to participate in a video conference e.g. headset
- Two PCs or one PC with dual screens. One will be for the web session and the other is for documentation access.
Further information will be provided prior to the start of the course.
The central component of the course is the understanding of asymmetric encryption, its functionality, possibilities and limitations. It shows exactly which steps are necessary to obtain a certificate and where and how the certificate components are stored and configured to enable authentication and encrypted communication.
- Basics of cryptography
- Hash, message authentication code, MD5, SHA
- Symmetric encryption
- Asymmetric encryption
- Public key, private key
- Properties and features of a key pair
- Public Key Infrastructure (PKI)
- RSA cryptosystem
- Key exchange, RSA and Diffie-Hellman
- From key pair to certificate
- Certificate signing request (CSR)
- Certification Authority (CA)
- Certificate chains
- Subscriber, trusted third party
- The X.509 standard
- Certificate formats (PEM, DER, PKCS#7, PKCS#12)
- Encrypted communication
- Server and client authentication
- SSL/TLS, OpenSSL
- Useful tools