This chapter covers the following topics:
Describe identity store options
Certificates used to be reserved for organizations with large security operations (SecOps) teams or for closed-loop systems that hid the certificate usage from the administrator, such as Active Directory. Many IT professionals hear words like certificate, X.509, or PKI and run away quietly, pretending they didn’t hear.
In today’s world of mobile devices, bring your own device (BYOD) IT, and borderless networks, certificates ...