July 2018
Intermediate to advanced
324 pages
9h 31m
English
Certificate-based authentication goes a step further. It uses the public key cryptography framework, where the public key is signed by a trusted certificate authority (CA). The CA uses its private key to sign the requester's public key. This gives the remote endpoint assurance that the originating endpoint has the private key and also serves as the proof of identity. Certificate-based authentication may be used for mutual authentication of server-to-server or device-to-server connections.
From automation and scalability standpoints, public-key-based digital certificates are a promising authentication method in IIoT use cases. Considering the resource-intensive nature of certificate-based authentication, in ...
Read now
Unlock full access