Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. We @wonderproxy use client side certificates to protect resources that only employees should access.

We @wonderproxy use client side certificates to protect resources that only employees should access.

Scheduled Pinned Locked Moved Uncategorized
4 Posts 3 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • preinheimer@phpc.socialP This user is from outside of this forum
    preinheimer@phpc.socialP This user is from outside of this forum
    preinheimer@phpc.social
    wrote last edited by
    #1

    We @wonderproxy use client side certificates to protect resources that only employees should access.

    I love it. There's a bit of initial work when someone new starts, but that's about it.

    It doesn't matter how much I screw up in a bunch of code because the webserver will not connect to a browser on those domains/directories.

    josh@joshbutts.socialJ guillaumerossolini@infosec.exchangeG 2 Replies Last reply
    0
    • preinheimer@phpc.socialP preinheimer@phpc.social

      We @wonderproxy use client side certificates to protect resources that only employees should access.

      I love it. There's a bit of initial work when someone new starts, but that's about it.

      It doesn't matter how much I screw up in a bunch of code because the webserver will not connect to a browser on those domains/directories.

      josh@joshbutts.socialJ This user is from outside of this forum
      josh@joshbutts.socialJ This user is from outside of this forum
      josh@joshbutts.social
      wrote last edited by
      #2

      @preinheimer @wonderproxy I've considered this many times. Ultimately we use Cloudflare Access to protect these things but they also offer that as an additional layer. At scale it always just felt like it was alot of IT work when it's [hundreds] of people.

      preinheimer@phpc.socialP 1 Reply Last reply
      0
      • josh@joshbutts.socialJ josh@joshbutts.social

        @preinheimer @wonderproxy I've considered this many times. Ultimately we use Cloudflare Access to protect these things but they also offer that as an additional layer. At scale it always just felt like it was alot of IT work when it's [hundreds] of people.

        preinheimer@phpc.socialP This user is from outside of this forum
        preinheimer@phpc.socialP This user is from outside of this forum
        preinheimer@phpc.social
        wrote last edited by
        #3

        @josh It's extra work for sure. I will say my last employer installed client side certs on all machines before handing them to end users, and it worked well there.

        1 Reply Last reply
        0
        • preinheimer@phpc.socialP preinheimer@phpc.social

          We @wonderproxy use client side certificates to protect resources that only employees should access.

          I love it. There's a bit of initial work when someone new starts, but that's about it.

          It doesn't matter how much I screw up in a bunch of code because the webserver will not connect to a browser on those domains/directories.

          guillaumerossolini@infosec.exchangeG This user is from outside of this forum
          guillaumerossolini@infosec.exchangeG This user is from outside of this forum
          guillaumerossolini@infosec.exchange
          wrote last edited by
          #4

          @preinheimer I used this exact method at my previous place where most of the team (20 people) worked on site, so the likelihood of a computer theft was limited to very few people

          It was working great, people loved not having to type in passwords and the direction LOVED not having this as a possible leak

          Trying to access our backends required a client certificate that you could only issue from within the office

          And I know that knowledgeable folks would have thrown me under the bus for many technically valid reasons —I think it was Ryan Sleevi perhaps? On a different social media that is no longer searchable

          Nowadays I’d add a login screen with a password manager deployed to everyone, so that the friction wouldn’t be too high, but the client cert would stay, if not for authentication of the individual, at least as a nice layer.

          1 Reply Last reply
          1
          0
          • R relay@relay.infosec.exchange shared this topic
          Reply
          • Reply as topic
          Log in to reply
          • Oldest to Newest
          • Newest to Oldest
          • Most Votes


          • Login

          • Login or register to search.
          • First post
            Last post
          0
          • Categories
          • Recent
          • Tags
          • Popular
          • World
          • Users
          • Groups