Chapter 15
Certificate-Based Authentication
This chapter covers the following topics:
Describe identity store options
Identify issues using authentication event details in Cisco ISE
Redirect ACL
Describe features and functionality of authentication and authorization
Certificates used to be reserved for organizations with large security operations (SecOps) teams or for closed-loop systems that hid the certificate usage from the administrator, such as Active Directory. Many IT professionals hear words like certificate, X.509, or PKI and run away quietly, pretending they didn’t hear.
In today’s world of mobile devices, bring your own device (BYOD) IT, and borderless networks, certificates ...
Get CCNP Security Identity Management SISE 300-715 Official Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.