Secure Computing ADMINGUIDEREVA Betriebsanweisung Seite 69

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 80
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 68
5
Deploying Soft-PK to Your End Users 5-1
5 7
C HAPTER 5
Deploying Soft-PK to Your
End Users
About this chapter This chapter summarizes the final preparation steps for deploying the
Soft-PK software, digital certificate files, and security policy to your
end users. It is based on a worksheet that you edit and send to each
remote end user.
IMPORTANT: This chapter assumes you have obtained the required certificates and
have configured and saved a security policy.
This chapter addresses the following topics:
"Overview" on page 5-2
"Customizing the user worksheet" on page 5-4
Seitenansicht 68
1 2 ... 64 65 66 67 68 69 70 71 72 73 74 ... 79 80

Kommentare zu diesen Handbüchern

Keine Kommentare