Trusted CAs can be organized into so called trusted groups for more convenient use, especially for configuring proxies using certificates for authentication. In ZMS policies, CAs are referenced through the trusted groups containing them.
Tip |
---|
The use of trusted groups is useful for example when configuring SSL proxying, especially if connection only to servers having a certificate issued by a well-known and trusted CA (that is, not self-signed) is permitted. For more information on SSL, see Chapter 3, The Zorp SSL framework in Zorp Professional 7 Reference Guide. |
Published on May 30, 2024
© BalaSys IT Ltd.
Send your comments to support@balasys.hu