March 2020
Intermediate to advanced
626 pages
14h 45m
English
Normally, you obtain a certificate from an established CA provider such as GeoTrust, DigiCert, GlobalSign, or GoDaddy when you want to establish that a certificate that has been issued to a computer name is legitimate to prevent a man-in-the-middle attack. The scope of issuance of the certificate is done using the name of the service using a service mesh implementation; we can either get a root certificate signed from an established provider or use our own root and intermediate certificate to issue certificates. To show this concept, we will use a simple to use open source smallstep.com way of using our own CA:
Read now
Unlock full access