Public Key Infrastructure (PKI) is a system where digital certificates are used to increase the reliability and scalability of authentication. Using certificate authentication requires that certificates are first created with certification authority (CA) software. For more information on certificates, see SSH Tectia Client/Server Product Description.
The Certificates page of the Settings dialog can be used to control the user's certificates.
Figure : The Certificates page
The available certificates are shown in the certificate list, located at the top of the Certificates page. The following fields are displayed on the certificate list:
This field shows the entity to whom the certificate has been issued.
This field shows the entity who has issued the certificate.
This field shows when the certificate will expire.
The following buttons can be used to control the certificates:
Click Import... to import a user certificate. A file selection dialog will open, allowing you to browse your directories for the saved certificate file.
Click Enroll... to start the Certificate Enrollment wizard, which is used to request a certification authority (CA) to issue a certificate. SSH Tectia Client supports the CMPv2 enrollment protocol.
Cryptomining with the SSH protocol: what big enterprises need to know about it
Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency. Read more
SLAM the door shut on traditional privileged access management
Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity? Read more
We broke the IT security perimeter
Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so. Read more