Trusted CAs can be organized into so called trusted groups for more convenient use, especially for configuring proxies using certificates for authentication. In MS policies, CAs are referenced through the trusted groups containing them.
Tip |
---|
The use of trusted groups is useful for example when configuring SSL proxying, especially if connection only to servers having a certificate issued by a well-known and trusted CA (that is, not self-signed) is permitted. For more information on SSL, see Chapter 3, The PNS SSL framework in Proxedo Network Security Suite 2 Reference Guide. |
© 2021 BalaSys IT Security.
Send your comments to support@balasys.hu