Raysync Security Design: Encryption Certificate Life Cycle Management
What's SSL certificate?
SSL certificate provides a way of authentication on the Internet, which is a digital information file used to identify and prove the identities of both parties.
Why do you need SSL certificates?
The website using an SSL certificate can guarantee the confidentiality of information exchange between users and servers and has the functions of no eavesdropping, no alteration, no denial, and no impersonation. Specifically as follows:
Transfer encrypted data on the internet to prevent theft.
Maintain the integrity of data in the transmission from endpoint A to endpoint B.
The encrypted data is transmitted to the server through the public key in the SSL certificate, and the server decrypts it with the private key to prove its identity.
Raysync SSL certificate configuration:
Enter the Raysync admin console -> Setting ->TLS certificate, upload the corresponding certificate, and you can also choose whether enable Prohibit non-SSL connections or not on this page.
The transmission server only supports encrypted certificates issued by formal root certificate service providers, which prevents self-signed low-strength encrypted certificates from becoming system vulnerabilities.
When the transport client finds that the transport server certificate has expired, it will refuse to communicate with the transport server and prompt the server that the certificate has expired.
The transmission server checks the valid time of the encryption certificate every day, and when the valid time is less than or equal to 30 days, prompts the administrator to replace the timely encryption certificate on the management portal.
If the prompt of the certificate is expired shown in the admin console, you need to upload the certificate again to ensure the transfer security.
As a file transfer acceleration software trusted by 2W+ enterprises, Raysync adopts the high-speed transmission protocol to build a highway for accelerating the transmission of enterprise data in the information age and also puts enterprise data security at the forefront of development.
Previous:What is Managed File Transfer?
Next:The Best Way to Fast File Transfer Between Two Computers