Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

Why should certificates from cross-certified infrastructures be validated using the bridge rather than simply using their root CAs in the trust store?

0
Posted

Why should certificates from cross-certified infrastructures be validated using the bridge rather than simply using their root CAs in the trust store?

0

This might be best illustrated with an example. Suppose you want to interoperate with the DST ACES PKI. The first step you need to take before users with DST credentials can use them is to install the DST ACES Root in your CAPI store. After you take this step, you’ll observe that your server accepts DST ACES certificates. Let’s suppose you stop after this step. Imagine that a malicious user fools the DST ACES CA into issuing a certificate to them under the name “CN=PACE.PETER.M, OU=USMC, OU=PKI, OU=DoD, O=U.S. Government, C=US”, a subject alternative name of peter.pace@usmc.mil. The applications on that server would reasonably think that they were seeing peter.pace@usmc.mil authenticating with a CAC card because the certificate would be validated. Needless to say, you never want your applications to think a DST-credentialed user is Peter Pace. If, instead of stopping here, you install Webcullis or another authentication plugin capable of using a bridged infrastructure to validate crede

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123