Chapter 15

Certificate-Based Authentication

This chapter covers the following topics:

Certificates used to be reserved for organizations with large security operations (SecOps) teams or for closed-loop systems that hid the certificate usage from the administrator, such as Active Directory. Many IT professionals hear words like certificate, X.509, or PKI and run away quietly, pretending they didn’t hear.

In today’s world of mobile devices, bring your own device (BYOD) IT, and borderless networks, certificates ...

Get CCNP Security Identity Management SISE 300-715 Official Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.