The Artima Developer Community
Sponsored Link

.NET Buzz Forum
eID.Chat

0 replies on 1 page.

Welcome Guest
  Sign In

Go back to the topic listing  Back to Topic List Click to reply to this topic  Reply to this Topic Click to search messages in this forum  Search Forum Click for a threaded view of the topic  Threaded View   
Previous Topic   Next Topic
Flat View: This topic has 0 replies on 1 page
David Cumps

Posts: 319
Nickname: cumpsd
Registered: Feb, 2004

David Cumps is a Belgian Student learning .NET
eID.Chat Posted: Apr 4, 2005 7:54 PM
Reply to this message Reply

This post originated from an RSS feed registered with .NET Buzz by David Cumps.
Original Post: eID.Chat
Feed Title: David Cumps
Feed URL: http://weblogs.asp.net/cumpsd/rss?containerid=12
Feed Description: A Student .Net Blog :p
Latest .NET Buzz Posts
Latest .NET Buzz Posts by David Cumps
Latest Posts From David Cumps

Advertisement
To demonstrate the possible use of eID in Windows applications, I created a small client/server application. This application contains a central server, which listens on a certain port for possible clients. After a client connects, it has to authenticate with the user’s eID card. The server then validates the certificate and checks if it is in the list of allowed users to connect.

If everything is valid, the client can connect and chat with other clients. Every message send to the server is signed by the client and validated, making sure each message arriving at the server originated from that user. The server then extracts the username from the certificate and uses this to broadcast the message to the other clients. Ultimately, this means users only have to insert their eID card, enter their PIN and are safely chatting away with others.

The steps used to authenticate a client are as follows:


  • The client asks for a logon.
  • The server sends a random challenge back to the client and remembers this value.
  • The client signs this challenge and sends the signed challenge back to the server along with its certificate.
  • The server first validates if the serial number of the certificate is in the database of allowed serials, otherwise the client gets denied.
  • After this it validates if the certificate is still valid. If it is expired or revoked, it denies the client.
  • The server takes the public key from the certificate and verifies the signature of the client.
  • If the signature is valid, the client is really who he claims to be, and is allowed to logon. The client certificate is stored to be used for future communication verification and to extract the client’s name to include in the broadcasted communication.
These steps can be implemented with CAPICOM or WSE in C# to provide authentication with eID.

Read: eID.Chat

Topic: Indigo Book Being Developed on Blog! Previous Topic   Next Topic Topic: SQL Server on Linux

Sponsored Links



Google
  Web Artima.com   

Copyright © 1996-2019 Artima, Inc. All Rights Reserved. - Privacy Policy - Terms of Use