exam questions

Exam ANS-C00 All Questions

View all questions & answers for the ANS-C00 exam

Exam ANS-C00 topic 1 question 88 discussion

Exam question from Amazon's ANS-C00
Question #: 88
Topic #: 1
[All ANS-C00 Questions]

An organization is deploying an application in a VPC that requires SSL mutual authentication with a client-side certificate, as that is the primary method of identifying clients. The Network Engineer has been tasked with defining the mechanism used within AWS to provide the SSL mutual authentication.
Which of the following options meets the organization's requirements?

  • A. Use a Classic Load Balancer and upload the client certificate private keys to it. Perform SSL mutual authentication of the client-side certificate there.
  • B. Use a Network Load Balancer with a TCP listener on port 443, and pass the request through for the SSL mutual authentication to be handled by a backend instance.
  • C. Use an Application Load Balancer and upload the client certificate private keys to it by using the native server name indication (SNI) features with smart certificate selection to handle multiple calling applications.
  • D. Front the application with Amazon API Gateway, and use its client-side SSL mutual authentication feature that uses the backend instances to verify the source of the request.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️
Reference:
https://aws.amazon.com/about-aws/whats-new/2017/10/elastic-load-balancing-application-load-balancers-now-support-multiple-ssl-certificates-and- smart-certificate-selection-using-server-name-indication-sni/

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
RaghuRajm
Highly Voted 3 years, 6 months ago
In certificate based authentication, the certificate contains only the public key and is signed by a trusted CA. Certificates will never have private key in it. A & C are out of scope. API gateway supports mutual TLS (mTLS). It authenticates the clients by making use of the provided PEM encoded trust store file (certificates of all required CA's in the chain). It will not check with the backend instances to verify the client's certificate. B is the right answer.
upvoted 15 times
...
jason2009
Highly Voted 3 years, 7 months ago
Those who said something about SNI Smart Cert selection... do you guys know what it means???? Seriously people. That means only one thing - you are taking this exam without even knowing what SNI is. SNI smart cert is about SERVER certificate for multi-homed deployment. It has nothing to do with client certificate / mutural auth. The option is there just to confuse people like this.
upvoted 5 times
...
clooudy
Most Recent 3 years ago
Selected Answer: B
Ans is B
upvoted 1 times
...
sapien45
3 years, 2 months ago
Great reddit discussion on this : ''Neither load balancers nor API Gateway support client certificate authentication from a user to your app. Just load balance the traffic using an ELB in TCP mode or a network load balancer. Then have each of your web servers set up to accept and validate client certificates against a list of trusted certificates. That functionality is built in to most modern web servers.''https://www.reddit.com/r/aws/comments/gohiwl/how_to_enable_two_way_ssl_in_the_aws_load/
upvoted 1 times
...
sapien45
3 years, 2 months ago
Basically, you want pass through authentification, B then Network Load balancer with TCP 443
upvoted 2 times
...
jason2009
3 years, 6 months ago
And for those who mentioned API Gateway, it seems you never implemented it in AWS API gateway. The key problem with D is that AWS API Gateway does NOT support custom backend for custom authorizers. It only support Cognito, Lambda and IAM. The identify of the client (which is determined by the client public key stored in AWS API Gateway) nor the authorization of such client (which requires custom authorizer) is never passed to your backend.
upvoted 2 times
...
jpvdham
3 years, 7 months ago
Both A and C suggest to upload de private key : upload the client certificate private keys. This is not how mutual SSL works. The client has the private key and can ben checked by the public part. Hense both B and D would work but B is the most simple solutions. So i would go for D.
upvoted 1 times
...
Justu
3 years, 7 months ago
B, as SNI is for multiple servers after ELB. Only possible method is to passthrough to backend server where the Client certificate is installed.
upvoted 2 times
...
PeppaPig
3 years, 7 months ago
B is correct. C importing private key to ALB is definitely wrong, you must never let your private key out of your own control if you choose to use client-side certificate
upvoted 4 times
...
zjd713
3 years, 7 months ago
D. api gateway support client side sertificate
upvoted 1 times
...
inf
3 years, 7 months ago
Answer: B A - incorrect - not possible to upload certificates to the Classic Load Balancer - upload to ACM or IAM. Plus client cert private keys would be kept with the client B - correct - Configure NLB for TCP, which is in effect pass-through. Application [web] service is where client side authentiction is enabled. C - incorrect - cannot use the ALB to perform client side authentication. it performs server-side authentication. Also, client-side auth keeps the private key with the client, not the server D - incorrect - no such thing as mutual auth feature in API gateway - its could be provided by other backend services
upvoted 5 times
...
OKMAN
3 years, 7 months ago
C https://aws.amazon.com/blogs/aws/new-application-load-balancer-sni/
upvoted 1 times
...
sensor
3 years, 7 months ago
C. NLB does not support sessions, which means each new request is passed to different server
upvoted 1 times
sensor
3 years, 7 months ago
Rethought my answer. It seems that it is B https://acloud.guru/forums/aws-certified-advanced-networking-specialty/discussion/-KyCFXevjK23iSm3qTBb/Sample%20Q%20:%20ELB~2FSSL%20Mutual%20Auth However, there are some references on cloud guru that client-cert authentication with ELB is possible on classic LB (which would increase performance instead doing it inapplication). https://acloud.guru/forums/aws-networking-specialty/discussion/-M93EIqR5kynmTYnFBH-/advanced_networking_speciality. Obviously an old question, I'll stick with B.
upvoted 2 times
...
...
kvirk
3 years, 7 months ago
Ans is B
upvoted 2 times
...
LexyA
3 years, 7 months ago
Its C. ALB supports SNI
upvoted 1 times
droop72
3 years, 7 months ago
https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-https-listener.html
upvoted 1 times
droop72
3 years, 7 months ago
The load balancer uses a smart certificate selection algorithm with support for SNI.
upvoted 1 times
...
...
JamesTR
3 years, 6 months ago
SNI is about servers, not clients: "Server Name Indication (SNI), an extension to the SSL/TLS protocol allows multiple SSL certificates to be hosted on a single unique IP address. SNI does this by inserting the HTTP header (virtual domain) in the SSL/TLS handshake. " https://cheapsslsecurity.com/blog/simplified-what-is-sni-server-name-indication-how-does-it-work/
upvoted 2 times
...
...
exmjame
3 years, 7 months ago
Interestingly both ELB and ALB none does support SSL mutual authentication. NLB can pass-through the request to backend EC2 and mutual SSL auth is managed by EC2.
upvoted 3 times
SilverT
3 years, 7 months ago
Agree, I would go for B. We need an NLB to pass through TCP traffic to the backend instance.
upvoted 1 times
...
...
skjs
3 years, 7 months ago
I would go for B
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago