官术网_书友最值得收藏!

Chapter 2. Implementing Security with Certificates

One of the most overlooked subjects when setting up Configuration Manager is the need to implement security. The requirements for this are purely on a per-customer basis. Very few industries will require this level of encryption for this type of data, unless they are supporting Internet-facing clients. Regardless of whether you are using certificates or not, information in Configuration Manager can be signed and encrypted. This is very useful and usually satisfies the majority of security requirements.

If this is not the case for your implementation, then you need to look at using certificates. In this chapter, we will look at certificates in detail from top to bottom; this will include looking at the following topics:

  • How to plan for certificates
  • How to set up secure communication using PKI and HTTPS
  • How to deploy certificates to domain joined workstations
  • How to deploy certificates to workgroup workstations
主站蜘蛛池模板: 讷河市| 高邑县| 开化县| 莫力| 南京市| 东明县| 高邑县| 和田县| 容城县| 武川县| 兴山县| 额尔古纳市| 汉川市| 紫金县| 英山县| 阳曲县| 宝坻区| 青岛市| 威远县| 安远县| 新邵县| 景泰县| 昌宁县| 邹城市| 三台县| 平顺县| 大埔县| 确山县| 吐鲁番市| 游戏| 杭锦旗| 固阳县| 寿宁县| 贺兰县| 景谷| 连江县| 临邑县| 惠东县| 德化县| 瓦房店市| 通州市|