Chapter 15

Certificate-Based Authentication

This chapter covers the following topics:

Certificates used to be reserved for organizations with large security operations (SecOps) teams or for closed-loop systems that hid the certificate usage from the administrator, such as Active Directory. Many IT professionals hear words like certificate, X.509, or PKI and run away quietly, pretending they didn’t hear.

In today’s world of mobile devices, bring your own device (BYOD) IT, and borderless networks, certificates ...

Get CCNP Security Identity Management SISE 300-715 Official Cert Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.