O'Reilly logo

A Guide to Claims-Based Identity and Access Control by Eugenio Pace, Matias Woloski, Keith Brown, Vittorio Bertocci, Dominick Baier

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix D. Certificates

This appendix lists the digital certificates that are used in claims-based applications. To see this in table form, see “Claims Based Identity & Access Control Guide” on CodePlex (http://claimsid.codeplex.com).

Certificates for Browser-Based Applications

In browser-based scenarios, you will find certificates used on the issuer and on the computer that hosts the Web application. The client computer does not store certificates.

On the Issuer (Browser Scenario)

In browser-based scenarios, you will find the following certificates on the issuer.

Certificate for TLS/SSL (Issuer, Browser Scenario)

The Transport Layer Security (TLS) protocol, Secure Sockets Layer (SSL) protocol uses a certificate to protect the communication with the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required