SSL signed certificates for internal use

Posted by rogueprocess on Stack Overflow See other posts from Stack Overflow or by rogueprocess
Published on 2010-04-20T15:10:31Z Indexed on 2010/04/20 15:13 UTC
Read the original article Hit count: 267

Filed under:
|
|

I have a distributed application consisting of many components that communicate over TCP (for examle JMS) and HTTP. All components run on internal hardware, with internal IP addresses, and are not accessible to the public.

I want to make the communication secure using SSL. Does it make sense to purchase signed certificates from a well-known certificate authority? Or should I just use self-signed certs?

My understanding of the advantage of trusted certs is that the authority is an entity that can be trusted by the general public - but that is only an issue when the general public needs to be sure that the entity at a particular domain is who they say they are.

Therefore, in my case, where the same organization is responsible for the components at both ends of the communication, and everything in between, a publicly trusted authority would be pointless. In other words, if I generate and sign a certificate for my own server, I know that it's trustworthy. And no one from outside the organization will ever be asked to trust this certificate. That is my reasoning - am I correct, or is there some potential advantage to using certs from a known authority?

© Stack Overflow or respective owner

Related posts about ssl

Related posts about certificates