access site
One is to unify the user access, and then normalize the Web site, so you must either use HTTP access, or use HTTPS to access the Web site for a unified format. The old left needs to jump to the HTTPS address for all addresses that are accessed with HTTP.
Because the old left this site is zblog PHP program, so directly in the root directory of the. htaccess file, add the 4 lines shown above, whether HTTP or not with WWW, will jump to the www form https.
Label: style blog HTTP color SP Div Problem CThis problem occurs because HTTPS authentication is not configured for a trusted server. By default, curl is set to not trust any cas, that is, it does not trust any server authentication. Therefore, this is why the browser cannot access your server over HTTPS. When this problem occurs, the best way for network programmers is to specify a set of default trusted cas, provided that you have purchased certificates from these CAS.If your content is not se
Let ' s encrypt as a public and free SSL project is gradually spread and use by the vast number of users, is by Mozilla, Cisco, Akamai, Identrust, eff and other organizations to launch, The main goal is also to promote the Web site from HTTP to https over the process, there are more and more businesses to join and sponsorship support.
The advent of let's encrypt free SSL
[Original address]
Tip/TRICK: enabling SSL on IIS 7.0 using self-signed certificates
SSL
Allow the browser to exchange information with the Web server over a secure channel to prevent eavesdropping, tampering, and message forgery. You should always use SSL on the login page (the user enters the user name and password) and all other security-sensitive webpages on
client certificates for secure access.
Use client certificates for secure access
A. Request the client certificate early
Access the CA server on the client (win7 on the local machine) (through the CA virtual directory under IIS)
Because ActiveX cannot be stored in Windows 7 due to unknown reasons during the testing process, we changed the client to vm2003, open the IE option-> content->
encrypted transmission protocol.
L http and https use different ports for completely different connection methods. The former is 80, and the latter is 443.
L The http connection is simple and stateless.
L HTTPS is a network protocol built by SSL + HTTP for encrypted transmission and identity authentication, which is more secure than http.
4. generate an SSL certificate
the visited web site (for example, when visiting Https://example received the "Example Inc." And not the certificates of other organizations);
or the relevant nodes on the Internet are trustworthy, or the user believes that the encryption layer (TLS or SSL) of this protocol cannot be compromised by the listener.
So the key to deploying HTTPS protocol access is certificates. Below is a look at the classification of HTTPS certificates.
Second,
from Http://www.cnblogs.com/P_Chou/archive/2010/12/27/https-ssl-certification.htmlGlobal trusted SSL Digital certificate request: http://www.shuzizhengshu.comIn the Internet Secure Communication mode, the most used is HTTPS with SSL and digital certificates to ensure the security of transmission and authentication. Thi
Global trusted SSL Digital certificate request: http://www.shuzizhengshu.comIn the Internet Secure Communication mode, the most used is HTTPS with SSL and digital certificates to ensure the security of transmission and authentication. This article has been traced around this model for a brief discussion.noun explanationFirst explain some of the above nouns:
OpenSSL self-built certificate SSL + Apache
I have prepared it. Well, the following is my note. For details, enter the author name: wingger.In this article, we will test the certificate on Linux9 + apache2.0.52, tomcat5.5.6, j2se1.5, and openssl0.97.The purpose of this article is to communicate. If any errors occur, please advise.Reprinted, please indica
After adding a certificate to the site, you need to use https: // to access the site, but the premise is to first obtain a certificate. You can obtain the certificate required for SSL communication from an Internet-based client, such as Verisign.
However, for testing, you ca
First, you need to understand some basic concepts before installing
1. Certificates used by SSL can be self-generated or signed by a commercial ca such as Verisign or thawte.
2. Certificate concept: First, you must have a root certificate, and then use the root certificate to issue the server
lower than that of symmetric encryption and decryption algorithms. Therefore, SSL uses asymmetric cryptographic algorithms to negotiate keys during the handshake process, and uses symmetric encryption and decryption methods to Encrypt transmission of HTTP content. The following is a metaphor for the image of this process (from http://blog.chinaunix.net/u2/82806/showart_1341720.html ):
Assume that a communicates with B, A is an
SSL is a commonly used WEB Service encryption channel. Its full name is Secure Socket Layer, which is also known as the Secure sockets interface. It uses digital certificates to ensure its security mechanism. The main function is encryption and authentication to protect the security of network transmission. It is in the middle of the HTTP and TCP layers.
SSL encryption and authentication use public keys and
(also the TCP client) sends a Clienth*llo after the TCP link is established, which contains the list of algorithms that it can implement and some other required messages.2. The server side of SSL responds to a Serverh*llo, which determines the algorithm required for this communication, and then sends its own certificate (which contains the identity and its own public key).3. When the client receives this m
Turn from: HTTPS Unidirectional authentication Instructions _ digital certificate, digital signature, SSL (TLS), SASLBecause TLS + SASL is used in the project to do the security authentication layer. So read some online information, here to do a summary.1. First recommend several articles:Digital certificate: http://www.cnblogs.com/hyddd/archive/2009/01/07/137129
The following is a Java certificate: HTTPS and SSL application notes test. I hope this article will help you.
When a connection is obtained, like a normal browser, the server certificate is still verified to be trusted (issued by an authority or signed by an authority). If the server certificate is untrusted, the defau
SSL protocol and digital certificate principles
1st Floor
Handshake and communication over the SSL protocolTo better understand and understand the SSL protocol, we will introduce the handshake protocol of the SSL protocol. SS
Handshake and communication over the SSL protocol
To better understand and understand the SSL protocol, we will introduce the handshake protocol of the SSL protocol. SSL uses both public key encryption and symmetric encryption. Although symmetric encryption is faster than public key encryption, public key encryption pr
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.