{"id":1279,"date":"2008-11-11T09:00:21","date_gmt":"2008-11-11T09:00:21","guid":{"rendered":"http:\/\/www.markwilson.co.uk\/blog\/2008\/11\/trusting-a-self-signed-certificate-in-windows.htm"},"modified":"2008-11-11T16:25:00","modified_gmt":"2008-11-11T16:25:00","slug":"trusting-a-self-signed-certificate-in-windows","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/trusting-a-self-signed-certificate-in-windows.htm","title":{"rendered":"Trusting a self-signed certificate in Windows"},"content":{"rendered":"<p>All good SSL certificates should come from a well-known certification authority &#8211; right?  Not necessarily (<a href=\"http:\/\/msmvps.com\/blogs\/alunj\/archive\/2008\/05\/10\/1618962.aspx\">as Alun Jones explains in defence of the self-signed certificate<\/a>).<\/p>\n<p>I have a number of devices at home that I access over HTTPS and for which the certificates are not signed by Verisign, Thawte, or any of the other common providers.  And, whilst <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2007\/07\/low-cost-ssl-certificates-from-go-daddy.htm\">I could get a free or inexpensive certificate for these devices<\/a>, why bother when only <em>I<\/em> need to access them  &#8211; and <em>I<\/em> do trust the self-signed cert!<\/p>\n<p>A case in point is the administration page for <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/10\/netgear-readynas-low-cost-raid-storage-for-the-consumer.htm\">my NetGear ReadyNAS<\/a> &#8211; this post describes how I got around it with Internet Explorer (IE) but the principle is the same for any self-signed certificate.<\/p>\n<p>First of all, I added the address to my trusted sites list.  As the <a href=\"http:\/\/kbserver.netgear.com\/kb_web_files\/N101696.asp\">ReadyNAS FAQ<\/a> describes, this is necessary on Windows Vista in order to present the option to install the certificate and the same applies on my Windows Server 2008 system.  Adding the site to the trusted sites list won&#8217;t stop IE from blocking navigation though, telling me that:<\/p>\n<p><em>There is a problem with this website&#8217;s security certificate.<\/p>\n<p>The security certificate presented by this website was not issued by a trusted certificate authority.<\/p>\n<p>Security certificates problems may indicate an attempt to fool you or intercept any data you send to the server.<\/p>\n<p>We recommend that you close this webpage and do not continue to this website.<\/em><\/p>\n<p>Fair enough &#8211; but I <em>do<\/em> trust this site, so I clicked the link to continue to the website regardless of Microsoft&#8217;s warning.  So, IE gave me another security warning:<\/p>\n<p><em>Security Warning<\/p>\n<p>The current webpage is trying to open a site in your Trusted sites list.  Do you want to allow this?<\/p>\n<p>Current site: res:\/\/ieframe.dll<br \/>\nTrusted site: https:\/\/<\/em>mydeviceurl<em><\/em><\/p>\n<p>Thank you IE&#8230; but yes, that&#8217;s why I clicked the link (I know, we have to protect users from themselves sometimes&#8230; but the chances are that <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/plea-for-user-friendly-firewall.htm\">they won&#8217;t understand this second warning and will just click the yes button anyway<\/a>).  After clicking yes to acknowledge the warning (which was a conscious choice!) I could authenticate and access the website.<\/p>\n<p>Two warnings every time I access a site is an inconvenience, so I viewed the certificate details and clicked the button to install the certificate (if the button is not visible, check the status bar to see that IE has recognised the site as from the Trusted Sites security zone).  This will launch the Certificate Import Wizard but it&#8217;s not sufficient to select the defaults &#8211; the certificate must be placed in the Trusted Root Certification Authorities store, which will present another warning:<\/p>\n<p><em>Security Warning<\/p>\n<p>You are about to install a certificate from a certification authority (CA) claiming to represent:<\/p>\n<p><\/em>mydeviceurl<em><\/p>\n<p>Windows cannot validate that the certificate is actually from &#8220;<\/em>certificateissuer<em>&#8220;. You should confirm its origin by contacting &#8220;<\/em>certificateissuer<em>&#8220;. The following number will assist you in this process:<\/p>\n<p>Thumbprint (sha1): <\/em>thumbprint<em><\/p>\n<p>Warning:<\/p>\n<p>If you install this root certificate, Windows will automatically trust any certificate issued by this CA. Installing a certificate with an unconfirmed thumbprint is a security risk. If you click &#8220;Yes&#8221; you acknowledge this risk.<\/p>\n<p>Do you want to install this certificate?<\/em><\/p>\n<p>Yes please!  After successfully importing the certificate and restarting my browser, I could go straight to the page I wanted with no warnings &#8211; just the expected authentication prompt.<\/p>\n<p>Incidentally, although I used Internet Explorer (version 8 beta) to work through this, once the certificate is in the store, then <del datetime=\"2008-11-11T16:23:09+00:00\">all browsers<\/del> any browser that uses the certificate store in Windows should act in the same manner (<del datetime=\"2008-11-11T16:23:09+00:00\">the certificate store is not browser-specific<\/del> some browsers, e.g. Firefox, implement their own certificate store).  To test this, I fired up Google Chrome and it was able to access the site I had just trusted with no issue but if I went to another, untrusted, address with a self-signed certfiicate (e.g. <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/08\/failed-power-supply-causes-impromptu-wireless-network-upgrade.htm\">my wireless access point<\/a>), Chrome told me that:<\/p>\n<p><em>The site&#8217;s security certificate is not trusted!<\/p>\n<p>You attempted to reach <\/em>mydeviceurl<em> but the server presented a certificate issued by an entity that is not trusted by your computer&#8217;s operating system. This may mean that the server has generated its own security credentials, which Google Chrome cannot rely on for identity information, or an attacker may be trying to intercept your communications. You should not proceed, especially if you have never seen this warning before for this site.<\/em><\/p>\n<p>Chrome also has some excellent text at a link labelled &#8220;help me understand&#8221; which clearly explains the problem.  Unfortunately, although Chrome exposes Windows certificate management (in the options, on the under the hood page, under security), it doesn&#8217;t allow addition a site to the trusted sites zone (which is an IE concept) &#8211; and that means the option to install the cerficate is not available in Chrome.  In imagine it&#8217;s similar in Firefox or Opera (or Safari &#8211; although I&#8217;m not sure who would actually want to run Safari on Windows).<\/p>\n<p>Before signing off, I&#8217;ll mention that problems may also occur if the certificate is signed with invalid details &#8211; for example the certificate on my wireless access point applies to another URL (www.netgear.com) and, as that&#8217;s not the address I use to access the device, that certificate will still be invalid.  The only way around a problem like this is to install another, valid, certificate (self-signed or otherwise).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>All good SSL certificates should come from a well-known certification authority &#8211; right? Not necessarily (as Alun Jones explains in defence of the self-signed certificate). I have a number of devices at home that I access over HTTPS and for which the certificates are not signed by Verisign, Thawte, or any of the other common &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/trusting-a-self-signed-certificate-in-windows.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Trusting a self-signed certificate in Windows<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[104,98,43,70],"class_list":["post-1279","post","type-post","status-publish","format-standard","hentry","tag-windows-server-2008","tag-windows-vista","tag-security","tag-web-browsers"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trusting a self-signed certificate in Windows - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/trusting-a-self-signed-certificate-in-windows.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trusting a self-signed certificate in Windows - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"All good SSL certificates should come from a well-known certification authority &#8211; right? Not necessarily (as Alun Jones explains in defence of the self-signed certificate). I have a number of devices at home that I access over HTTPS and for which the certificates are not signed by Verisign, Thawte, or any of the other common &hellip; Continue reading Trusting a self-signed certificate in Windows\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/trusting-a-self-signed-certificate-in-windows.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2008-11-11T09:00:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2008-11-11T16:25:00+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/11\\\/trusting-a-self-signed-certificate-in-windows.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/11\\\/trusting-a-self-signed-certificate-in-windows.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Trusting a self-signed certificate in Windows\",\"datePublished\":\"2008-11-11T09:00:21+00:00\",\"dateModified\":\"2008-11-11T16:25:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/11\\\/trusting-a-self-signed-certificate-in-windows.htm\"},\"wordCount\":917,\"commentCount\":8,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Microsoft Windows Server 2008\",\"Microsoft Windows Vista\",\"Security\",\"Web Browsers\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/11\\\/trusting-a-self-signed-certificate-in-windows.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/11\\\/trusting-a-self-signed-certificate-in-windows.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/11\\\/trusting-a-self-signed-certificate-in-windows.htm\",\"name\":\"Trusting a self-signed certificate in Windows - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2008-11-11T09:00:21+00:00\",\"dateModified\":\"2008-11-11T16:25:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/11\\\/trusting-a-self-signed-certificate-in-windows.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/11\\\/trusting-a-self-signed-certificate-in-windows.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/11\\\/trusting-a-self-signed-certificate-in-windows.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trusting a self-signed certificate in Windows\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trusting a self-signed certificate in Windows - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/trusting-a-self-signed-certificate-in-windows.htm","og_locale":"en_GB","og_type":"article","og_title":"Trusting a self-signed certificate in Windows - markwilson.it","og_description":"All good SSL certificates should come from a well-known certification authority &#8211; right? Not necessarily (as Alun Jones explains in defence of the self-signed certificate). I have a number of devices at home that I access over HTTPS and for which the certificates are not signed by Verisign, Thawte, or any of the other common &hellip; Continue reading Trusting a self-signed certificate in Windows","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/trusting-a-self-signed-certificate-in-windows.htm","og_site_name":"markwilson.it","article_published_time":"2008-11-11T09:00:21+00:00","article_modified_time":"2008-11-11T16:25:00+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/trusting-a-self-signed-certificate-in-windows.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/trusting-a-self-signed-certificate-in-windows.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Trusting a self-signed certificate in Windows","datePublished":"2008-11-11T09:00:21+00:00","dateModified":"2008-11-11T16:25:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/trusting-a-self-signed-certificate-in-windows.htm"},"wordCount":917,"commentCount":8,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Microsoft Windows Server 2008","Microsoft Windows Vista","Security","Web Browsers"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/trusting-a-self-signed-certificate-in-windows.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/trusting-a-self-signed-certificate-in-windows.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/trusting-a-self-signed-certificate-in-windows.htm","name":"Trusting a self-signed certificate in Windows - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2008-11-11T09:00:21+00:00","dateModified":"2008-11-11T16:25:00+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/trusting-a-self-signed-certificate-in-windows.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/trusting-a-self-signed-certificate-in-windows.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/trusting-a-self-signed-certificate-in-windows.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Trusting a self-signed certificate in Windows"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":5614,"url":"https:\/\/www.markwilson.co.uk\/blog\/2015\/05\/public-key-infrastructure-explained.htm","url_meta":{"origin":1279,"position":0},"title":"Public key infrastructure explained","author":"Mark Wilson","date":"Wednesday 6 May 2015","format":false,"excerpt":"Last week, I was attending a presentation skills course where we had to give an impromptu presentation (well, we had an hour to prepare) on a topic of our choice. \u00a0One of my colleagues, Richard Butler, gave his talk on public key infrastructure (PKI) and Richard was the first person\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":541,"url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/03\/publicprivate-key-cryptography-in.htm","url_meta":{"origin":1279,"position":1},"title":"Public\/private key cryptography in plain(ish) English","author":"Mark Wilson","date":"Wednesday 22 March 2006","format":false,"excerpt":"Public key infrastructure (PKI) is one of those things that sounds like a good idea, but which I can never get my head around. It seems to involve so many terms to get to grips with and so, when Steve Lamb presented a \"plain English\" PKI session at Microsoft UK\u2026","rel":"","context":"In \"Security\"","block_context":{"text":"Security","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/security"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2052,"url":"https:\/\/www.markwilson.co.uk\/blog\/2010\/09\/extending-certificate-validity-to-avoid-mousevideo-refresh-issues-with-the-hyper-v-virtual-machine-connection.htm","url_meta":{"origin":1279,"position":2},"title":"Extending certificate validity to avoid mouse\/video refresh issues with the Hyper-V Virtual Machine Connection","author":"Mark Wilson","date":"Monday 20 September 2010","format":false,"excerpt":"In order to avoid man in the middle attacks, Hyper-V's Virtual Machine Connection (vmconnect.exe) requires certificates for a successful connection.\u00c2\u00a0 At some point, the certificates expire, resulting in an error message when connecting to virtual machines, as described in Microsoft knowledge base article 967902, which also includes details of an\u2026","rel":"","context":"In \"Microsoft Virtual Server\/Hyper-V\"","block_context":{"text":"Microsoft Virtual Server\/Hyper-V","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/hyper-v"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":700,"url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/04\/putting-pki-into-practice.htm","url_meta":{"origin":1279,"position":3},"title":"Putting PKI into practice","author":"Mark Wilson","date":"Sunday 9 April 2006","format":false,"excerpt":"Recently, I blogged about public\/private key cryptography in plain(ish) English. That post was based on a session which I saw Microsoft UK's Steve Lamb present. A couple of weeks back, I saw the follow-up session, where Steve put some of this into practice, securing websites, e-mail and files. Before looking\u2026","rel":"","context":"In \"Microsoft Windows\"","block_context":{"text":"Microsoft Windows","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/windows"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":830,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/07\/some-more-about-terminal-services-gateway-servers.htm","url_meta":{"origin":1279,"position":4},"title":"Some more about Terminal Services Gateway Servers","author":"Mark Wilson","date":"Tuesday 10 July 2007","format":false,"excerpt":"In an earlier post, I mentioned Austin Osuide's recent Windows Server User Group presentation on Terminal Services Gateway Server and what follows is some of the detail from that session. Terminal Services Gateway Server is a server role in Windows Server 2008 - effectively a protocol translator that allows authorised\u2026","rel":"","context":"In \"Microsoft Windows Server 2008\"","block_context":{"text":"Microsoft Windows Server 2008","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/windows-server-2008"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":891,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/09\/microsoft-unified-communications-part-5-notes-from-a-real-deployment.htm","url_meta":{"origin":1279,"position":5},"title":"Microsoft Unified Communications: part 5 (notes from a real deployment)","author":"Mark Wilson","date":"Thursday 11 September 2008","format":false,"excerpt":"Over the last week or, so I've posted several articles on the Microsoft View of Unified Communications (UC), looking at An introduction to UC (from a Microsoft view). How UC can change the ways in which we work. How the various Microsoft UC components work together. Some of the things\u2026","rel":"","context":"In \"Microsoft Exchange\"","block_context":{"text":"Microsoft Exchange","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/exchange"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1279"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1279\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}