Your browser does not support HTML5 local storage or you have disabled it. Some functionality on this site, including saving your privacy settings and offering you special discounts, uses local storage and may not work with local storage disabled. We recommend allowing the use of local storage in your browser. In some browsers, it is the same setting used for disabling cookies.
Configuring Certificate Authentication on Tectia Server
After a certificate has been enrolled for a host, if the host has a deployed configuration, the configuration is automatically updated and the certificate is taken into use. No further configuration steps are necessary to enable authenticating the host using the certificate.
If the host has an assigned configuration that is not yet deployed, the certificate is enrolled for the host, but it is taken into use only after the configuration is deployed. Once deployed, the configuration will automatically use the certificate information.
If the host does not have an assigned configuration, only the certificate is enrolled for the host and no configuration is deployed to the host. To use the certificate for authenticating the host, you have to create a configuration for the host, and assign and deploy it. Once deployed, the configuration will automatically use the certificate information.
Copyright 2011 Tectia Corporation This software is protected by international copyright laws. All rights reserved. Contact Information