Understand the request flow
To start, you should have a basic understanding of the flow of a request and how the Akamai content delivery network (CDN) fits in.
Secure hypertext transfer protocol (HTTPS) has become the standard for access on the Internet. All processes covered here assume you're using this security to deliver your content via the Akamai network. While non-secure HTTP is still supported, it's not recommended.
The stages of a request
There are two connections involved in a request using the Akamai platform:
- The client to the Akamai edge server. This is the initial connection between the end user's browser or application and an edge server in the Akamai network. The request is resolved to an edge hostname that you assign to your actual hostname. The edge hostname directs the request to your property, which is read to determine how to deliver content to the end user. To secure the connection, you'll need to use an "edge certificate" that's verified between the client and the edge server.
- The Akamai edge server to origin. This is the connection between the edge server and your designated origin, where the requested content is hosted. You'll use various behaviors in your property to set up your origin. Depending on your selected origin type, you may need to create a separate secure certificate and apply it on your origin.
Understand secure connections
HTTPS embodies security on the web. When end users make an HTTPS request to your site or application, they expect that their request and the response are encrypted and trusted, end to end.
At its base, HTTPS (also known as Secure Sockets Layer,
SSL or Transport Layer Security,
TLS) compares a pair of encryption keys, one
public and one
private, to allow access. When an HTTPS connection is established, the server sends the requesting client a certificate with:
- the public key
- a list of sites on which the cert is valid, referred to as a
- an expiration date for the cert
- a signature from a Certificate Authority that proves that the key is legitimate for a SAN listed in the cert
The client checks whether:
- the signature matches the cert.
- the cert came from a Certificate Authority it trusts.
- the cert is actually for the site it requested.
- the cert hasn't expired.
If those checks succeed, the client encrypts this information using the public key, and sends it to the server, establishing a shared key for the session. Only a server that holds the corresponding private key can decrypt the information, read the shared key, and ultimately prove its identity to the requesting client.
Updated about 1 year ago