The IT department faces the tasks of setting up all client TPs and of ensuring effective deployment of the overall solution. This section looks at the problem of setting up and managing appropriate sets of TPM keys across client platforms.

As seen in various chapters of this book, TCPA technology requires management of an important set of keys and certificates. Therefore, the distribution of keys and their authorization is critical for an efficient and effective implementation of a TCPA-based corporate solution. It has already been assumed within this chapter that the owner of the platforms will be the IT department of the corporation. The following section will discuss what this implies for TPM keys in terms of managing their authorization ...

Get Trusted Computing Platforms: TCPA Technology in Context now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.