Cybersecurity: X.509 Certificates vs Vaults
Автор: ByteMonk
Загружено: 2026-01-20
Просмотров: 2222
Why are we still using passwords and SSH keys stored in vaults when X.509 certificates have been securing the internet since the 1980s?
🔗 Try Teleport's Vault-Free PAM: https://fandf.co/3MrBdWG
In this video, we break down:
What X.509 certificates are and how they work
The role of Certificate Authorities (CA)
What vaults are and how they manage credentials
The problems with static credentials - rotation, sprawl, stolen secrets
What Privileged Access Management (PAM) means
How Teleport's vault-free approach uses short-lived certificates instead
Whether you're a DevOps engineer, security professional, or just curious about how infrastructure access works - this video is for you.
⏱️ Timestamps:
0:00 - Introduction
1:09 - What is X.509?
2:35 - Why didn't we use certificates for infrastructure?
3:36 - What is a Vault?
5:08 - The problem with Vaults
6:55 - Teleport's Vault-Free PAM approach
8:57 - Quick Demo
📌 Related Videos:
SSO Explained: • Single Sign-On (SSO) Explained in 10 Minut...
How SSH Works: • How SSH Works | Keys, Encryption & Real-Wo...
This video is sponsored by Teleport.
• System Design Interview Basics
• System Design Questions
• LLM
• Machine Learning Basics
• Microservices
• Emerging Tech
#X509 #Certificates #PAM #Vault #CloudSecurity #Teleport
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: