TAILIEUCHUNG - Review the detailed steps covered in the demonstration.

Connect to https://partner/securit y and present the Certcomputer (where computer is the NetBIOS name of your computer) certificate for authentication. | Designing a Public Key Infrastructure Detailed Steps Review the detailed steps covered in the demonstration. Tasks Detailed Steps Important Perform the following procedures at both partner computers. 1. Log on as certcomputer and connect to the site http partner security where partner is the NetBIOS name of your partner s computer by using Internet Explorer. a. Ensure that you are logged on as certcomputer where computer is the NetBIOS name of your computer with a password of password. b. Double-click Internet Explorer on the desktop. c. In the address bar type http partner security wherepartner is the NetBIOS name of your partner s computer . Can you access the Web site Why or why not O No. The http par ner security Web site has been configured to require a secure channel therefore the Web browser must specify the Uniform Resource Locator URL by using https ZZpartner security. 2. Connect to https partner securit y and present the Certcomputer where computer is the NetBIOS name of your computer certificate for authentication. d. In the address bar type https parZner security e. In the Security Alert dialog box click OK. f. In the Client Authentication dialog box ensure that the Certcomputer where computer is the NetBIOS name of your computer certificate is selected and then click OK. g. Close Internet Explorer and log off. Copyright 2002 Microsoft Corporation. All Rights Reserved. Designing a Public Key Infrastructure Tasks Detailed Steps Can you access the Web site Did you need to type credentials Yes the Web site can be accessed. No there was no need to type credentials because the certificate provided your credentials for the Web site. Could the account mapping for the certificate have been performed differently If so what are advantages or disadvantages of the other method or methods Yes. You could have created the certificate mapping by using Active Directory Users and Computers. The advantage of this is that any PKI-based application within the forest could .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.