官术网_书友最值得收藏!

Chapter 2. Implementing Security with Certificates

One of the most overlooked subjects when setting up Configuration Manager is the need to implement security. The requirements for this are purely on a per-customer basis. Very few industries will require this level of encryption for this type of data, unless they are supporting Internet-facing clients. Regardless of whether you are using certificates or not, information in Configuration Manager can be signed and encrypted. This is very useful and usually satisfies the majority of security requirements.

If this is not the case for your implementation, then you need to look at using certificates. In this chapter, we will look at certificates in detail from top to bottom; this will include looking at the following topics:

  • How to plan for certificates
  • How to set up secure communication using PKI and HTTPS
  • How to deploy certificates to domain joined workstations
  • How to deploy certificates to workgroup workstations
主站蜘蛛池模板: 东莞市| 巴南区| 抚州市| 太谷县| 越西县| 苏尼特左旗| 河源市| 罗源县| 佛冈县| 马龙县| 惠东县| 敦煌市| 土默特右旗| 富民县| 庆安县| 大方县| 扎鲁特旗| 南丹县| 金川县| 克什克腾旗| 军事| 宁都县| 南江县| 毕节市| 博爱县| 柳州市| 壤塘县| 德昌县| 山阴县| 武定县| 罗定市| 大埔区| 宣威市| 永德县| 哈密市| 合山市| 武邑县| 布拖县| 曲阜市| 修武县| 阿坝|