The Role of Certificates

F5 Ecosystem | May 22, 2022

This guest blog is part of a series and was created in partnership with F5.

CSR, PEM, DER, X509… it’s no wonder that certificates are often seen as some type of magic.

The very first time that I had to get a certificate working, I had no idea what I was doing! I aimlessly copied a bunch of commands and hoped that they worked. But when it comes to security, expecting someone to blindly copy commands is a risky thing to do. None more so than certificates.

Certificates are the cornerstone of TLS (and most commonly HTTPS, which utilises TLS) connections. Get this wrong, and you open yourself up to the risk of the connection being intercepted by an attacker (effectively negating the protection that the TLS connection provides).

This blog is part of a series that will uncover the role of certificates and especially certificate management. In the first part, we will explore the purpose of certificates and why they play an important role in securing connections (namely TLS connections).

Guaranteeing confidentiality and establishing integrity

When a client connects to a server there are two security principles that we need to consider.

The first is confidentiality. This is critical so the data transmitted to and from the client is not visible to anyone outside of that traffic. A login page is a good example. We want to ensure that the username and password that you enter are not visible to anyone when they are transported with the server that you are trying to log in to. It is also worth noting that confidentiality plays into the privacy aspect as well, preventing prying eyes from looking into what actions or information you are viewing.

The second principle is integrity. This is one that many people forget or are not aware of when it comes to TLS. By integrity, we mean that no one can tamper with the data that is being transmitted to and from the client. Even if the resource is public, we still want to ensure the integrity of this data.

Consider a publicly accessible news site. We aren’t too concerned about the confidentiality aspect (apart from privacy, but for this example let’s put that to the side) since this page is publicly available. However, we want to make sure that the data sent to the client (a user’s browser) from the server has not been manipulated. Without considering the integrity of a server, an attacker could edit the content of a news article (think fake news), or inject malicious content onto the page, such as a Browser Exploitation Framework hook.

The importance of certificates

So, where do certificates play a role in all of this? When a client connects to a server, they need to ensure that it is first connecting to the intended server. Not a server that an attacker has mimicked. We also want to guarantee that the connection is encrypted end-to-end. By this, we mean that the connection hasn’t been terminated somewhere to allow for traffic inspection and modification, and forwarded on to the original server. This is referred to as a machine-in-the-middle attack.

Now to be clear, there are valid use cases for this, especially in a corporate environment where internet traffic is often inspected to help improve the security of the organisation. This is where certificates come into the picture. When a client connects to a server of TLS, the server will have to provide its (server) certificate to the client. The client will then validate this certificate to ensure that it belongs to the correct server that the client was originally attempting to connect to. Once this has been established—a part of the TLS handshake—communications between the client and server can commence.

In the next part of this series I’ll continue exploring this topic on my own blog. There, we will cover the process of validating certificates. This is where we will delve into the human side to certificate management and its importance.

Until then, I highly recommend please that you check out an informative F5 myForum session (Be Prepared for the Changing SSL Landscapefrom David Warburton and Nigel Ashworth. It's a great overview of the continually evolving SSL and TLS landscapes, and is well worth your time.

Sean Wright is an experienced application security engineer who started out as a software developer. He is primarily focused on web-based application security, with a special interest in TLS and supply chain-related subjects. Sean is also experienced in providing technical leadership in relation to application security, as well as engaging with teams to improve the security of systems and applications that they develop and maintain. You can read his blog here.

Share
Tags: 2022

Related Blog Posts

The everywhere attack surface: EDR in the network is no longer optional
F5 Ecosystem | 11/12/2025

The everywhere attack surface: EDR in the network is no longer optional

All endpoints can become an attacker’s entry point. That’s why your network needs true endpoint detection and response (EDR), delivered by F5 and CrowdStrike.

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift
F5 Ecosystem | 11/11/2025

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift

F5 collaborates with Red Hat to deliver a solution that combines the high-performance app delivery of F5 NGINX with Red Hat OpenShift’s enterprise Kubernetes capabilities.

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5 Ecosystem | 10/28/2025

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture

F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.

F5 Silverline Mitigates Record-Breaking DDoS Attacks
F5 Ecosystem | 08/26/2021

F5 Silverline Mitigates Record-Breaking DDoS Attacks

Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.

Volterra and the Power of the Distributed Cloud (Video)
F5 Ecosystem | 04/15/2021

Volterra and the Power of the Distributed Cloud (Video)

How can organizations fully harness the power of multi-cloud and edge computing? VPs Mark Weiner and James Feger join the DevCentral team for a video discussion on how F5 and Volterra can help.

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
F5 Ecosystem | 12/08/2020

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies

David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us