Примеры использования Trusted root на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
To verify the installation of the trusted root key.
Manage Trusted Root Certificates.
To manage trusted root certificates for a local computer.
Managing trusted root certificates for a domain.
Managing trusted root certificates for a local computer.
Some organizations want to prevent users in the domain from configuring their own set of trusted root certificates and to decide which root certificates within the organization can be trusted. .
The trusted root key provides a mechanism for clients to verify the authenticity of the management point
Automatic publishing of trusted root authorities, intermediate certification authorities,
Ensure that the Root certificate appears under" Trusted Root Certification Authorities"
To identify the trusted root certificates that you would like to distribute to clients in your domain,
The trusted root key is stored in the client registry
In addition, some organizations may want to identify and distribute specific trusted root certificates to enable business scenarios where additional trust relationships are needed.
to Tree tab and right click on Trusted Root Certification Authorities,
In a single site hierarchy that requires trusted root key authentication, always use a separate management point.
In Trusted Root Certification Authorities, select the trusted root certification authority(CA)
it will generate a new trusted root key.
In Trusted Root Certification Authorities, select the CA
After the trusted root has been established, it can be used to authorize subordinate CAs to issue certificates on its behalf.
it will accept the new trusted root key.