O'Reilly logo

Spring Security 3 by Peter Mularien

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Considerations when implementing Client Certificate authentication

Client certificate authentication, while highly secure, isn't for everyone, and isn't appropriate for every situation.

Pros:

  • Certificates establish a framework of mutual trust and verifiability that both parties (client and server) are who they say they are
  • Certificate-based authentication, if implemented properly, is much more difficult to spoof or tamper with than other forms of authentication
  • If a well-supported browser is used and configured correctly, client certificate authentication can effectively act as a single sign-on solution, enabling transparent login to all certificate-secured applications

Cons:

  • Use of certificates typically requires the entire user population to have ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required