Export (0) Print
Expand All

TLS/SSL (Schannel SSP) Overview

Published: February 29, 2012

Updated: February 6, 2012

Applies To: Windows 8, Windows 8.1, Windows Server 2012, Windows Server 2012 R2



This topic for the IT professional introduces the TLS/SSL implementation in Windows using the Schannel Security Service Provider (SSP) by describing practical applications, changes in Microsoft’s implementation, and software requirements, plus additional resources for Windows Server 2012 and Windows 8.

Did you mean…

Schannel is a Security Support Provider (SSP) that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Internet standard authentication protocols.

The Security Support Provider Interface (SSPI) is an API used by Windows systems to perform security-related functions including authentication. The SSPI functions as a common interface to several Security Support Providers (SSPs), including the Schannel SSP.

The Transport Layer Security (TLS) protocol versions 1.0, 1.1, and 1.2, Secure Sockets Layer (SSL) protocol, versions 2.0 and 3.0, Datagram Transport Layer Security (DTLS) version 1.0, and the Private Communications Transport (PCT) protocol are based on public key cryptography. The Security Channel (Schannel) authentication protocol suite provides these protocols. All Schannel protocols use a client/server model.

One problem when you administer a network is securing data that is being sent between applications across an untrusted network. You can use TLS/SSL to authenticate servers and client computers and then use the protocol to encrypt messages between the authenticated parties.

For example, you can use TLS/SSL for:

  • SSL-secured transactions with an e-commerce website

  • Authenticated client access to an SSL-secured website

  • Remote access

  • SQL access

  • E-mail

The following table notes the changes to the Schannel SSP to allow for the Datagram Transport Layer Security (DTLS) (RFC 4347), Server Name Indicator, configurable hints for certificates, and ability to configure the Schannel provider to use specific trusted root stores.

 

Feature/functionality Windows Server 2008 R2 Windows Server 2012

Inclusion of TLS 1.2

X

X

Inclusion of DTLS

X

TLS support for Server Name Indicator (SNI) extensions

X

Manageability improvements to configure a list of certificate roots to be used by a website as the trust anchors for the purposes of validating a client certificate

X

Manageability improvements to configure a list of certificates hints for eventual selection by the client computer

X

For information about these changes in functionality for TLS/SSL, see What's New in TLS/SSL (Schannel SSP).

In the Schannel SSP for Windows Server 2012 and Windows 8, there are no deprecated features or functionality. The Private Communications Transport (PCT) protocol is disabled by default, as it was in the past version.

The TLS/SSL protocol use a client/server model and are based on certificate authentication, which requires a Public Key Infrastructure.

There are no configuration steps necessary to implement TLS, SSL or Schannel using Server Manager or the Add Features feature.

The following table provides links to additional resources related to TLS, SSL and the Schannel SSP.

 

Content type References

Product evaluation

What's New in TLS/SSL (Schannel SSP)

Planning

TLS/SSL Technical Reference (2003)

Deployment

Not yet available

Operations

Not yet available

Troubleshooting

Not yet available

Security

Not yet available

Tools and settings

Not yet available

Community resources

Private Cloud Security Model - Wrapper Functionality

Related technologies

Active Directory Certificate Services Overview

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

ADD
Show:
© 2014 Microsoft