I, like Gadi, am certianly no PKI expert. I've seen folks get badly burned
by this fire though...
On Sat, 26 Mar 2005, Sean Donelan wrote:
>
> Most people figured out I was not looking for a "public" CA solution.
> There is very little reason why internal certificates need to be
> recognized wo
[snip]
organization. Also I didn't say it, but I'm not looking to identify
natural people.
[snip]
The Cisco IOS CA and Microsoft CA have the advantage of being
integrated with a lot of each vendor's products. Once set up,
both try to simplfy on-going maintenance as long as you use
their products.
Most people figured out I was not looking for a "public" CA solution.
There is very little reason why internal certificates need to be
recognized world-wide, or by anything outside of the internal
organization. Also I didn't say it, but I'm not looking to identify
natural people.
Instead of usin
Sean Donelan wrote:
Routers, IP phones, VPN, etc are starting to get reasonable support
for certificates. So network operators may need some PKI as part
of their infrastructure (rather than the traditional application-layer
PKI such as Web/SSL).
But there seems to be only two choices for Public Ke
Routers, IP phones, VPN, etc are starting to get reasonable support
for certificates. So network operators may need some PKI as part
of their infrastructure (rather than the traditional application-layer
PKI such as Web/SSL).
But there seems to be only two choices for Public Key Infrastructure.