官术网_书友最值得收藏!

Chapter 2. Implementing Security with Certificates

One of the most overlooked subjects when setting up Configuration Manager is the need to implement security. The requirements for this are purely on a per-customer basis. Very few industries will require this level of encryption for this type of data, unless they are supporting Internet-facing clients. Regardless of whether you are using certificates or not, information in Configuration Manager can be signed and encrypted. This is very useful and usually satisfies the majority of security requirements.

If this is not the case for your implementation, then you need to look at using certificates. In this chapter, we will look at certificates in detail from top to bottom; this will include looking at the following topics:

  • How to plan for certificates
  • How to set up secure communication using PKI and HTTPS
  • How to deploy certificates to domain joined workstations
  • How to deploy certificates to workgroup workstations
主站蜘蛛池模板: 卓资县| 钟山县| 株洲县| 沐川县| 宣汉县| 贵港市| 句容市| 青龙| 云南省| 凤庆县| 通辽市| 固始县| 安岳县| 伊金霍洛旗| 渭南市| 花垣县| 连山| 宝清县| 武鸣县| 广平县| 沭阳县| 广丰县| 边坝县| 星座| 新疆| 灵台县| 龙江县| 通渭县| 玛曲县| 尼勒克县| 文水县| 吴江市| 兴和县| 兴义市| 扬中市| 永丰县| 陵水| 静宁县| 汝阳县| 夹江县| 九龙城区|