GE 23954 Manuel D’Utilisation

Page de 58
7.3.2  SSL Certificates 
HTTPS is not a protocol itself, but it actually refers to HTTP communication over SSL (Secure Sockets 
Layer) connection. HTTPS uses public-key cryptography to protect the communication. With HTTPS, the 
server sends back its identification in the form of a digital certificate. The certificate usually contains 
the server name, the trusted certificate authority (CA), and the server's public encryption key.  
The server certificate includes a digital signature from a certification authority. Each browser is normally 
equipped with a set of CA root certificates of commercial authorities. The web browsers perform a set of 
verifications over the digital certificate in order to validate the certificate and start the HTTPS 
communication. The main checks are substantially the following: 
•  The client verifies that the issuing Certificate Authority (CA) is on its list of trusted CAs.  
•  The client checks the server's certificate validity period 
Further to this, the client may compare the actual DNS name of the server to the DNS name on the 
certificate (though this last point may be browser dependent).  
Below is a sample of the results of these checks, when browser attempts to establish an HTTP 
connection to the web server embedded in the SNMP/Web adapter (the sample is take from Internet 
Explorer, but similar indications can be obtained with the most common browsers): 
 
 
 
First of all, in order to verify the actual certificate, its fingerprint (sometimes also knows as thumbprint) 
can be checked against the one provided by the SNMP/Web adapter. Particularly, select View Certificate 
and look for the fingerprint/thumbprint: 
 
 
Modifications reserved 
Page 47/58 
OPM_CNT_SNM_BAS_CRD_1GB_V012.doc 
Operating Manual SNMP/Web Adapter