Примеры использования Trusted root key на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Clients require the trusted root key only if they cannot query the Global Catalog for Configuration Manager 2007 information,
In mixed mode, clients authenticate their management points using either Active Directory Domain Services or by using the Configuration Manager 2007 trusted root key, as described in About the Trusted Root Key. .
clients rely on the trusted root key to authenticate valid management points.
then configuring the trusted root key is recommended to help clients establish their initial trust relationship with a valid management point.
As an alternative, you can reinstall the client with the new trusted root key, for example, by using client push from the new site, or by specifying the SMSPublicRootKey property with CCMSetup. exe.
been signed by the trusted root key, and then forwards it to the hierarchy manager to sign it with the site's trusted root key.
If you are not sure if a Microsoft System Center Configuration Manager 2007 client computer has received the trusted root key, or if you want to verify that a client has the correct trusted root key, you can view the trusted root key in the WMI on the Configuration Manager 2007 client computer.
What is the trusted root key?
The copy of the public trusted root key.
How do clients obtain the trusted root key?
How do clients refresh the trusted root key?
To verify the installation of the trusted root key.
How do management points obtain the trusted root key?
What if clients do not have the trusted root key?
The management point's certificate signed by the trusted root key.
A copy of the public trusted root key from the central site.
A copy of the public trusted root key signed by the management point's private key. .
When the management point receives the copy of the public trusted root key, it signs the trusted root key with its own private key. .
After the client has obtained a copy of the trusted root key, it keeps that copy in the registry.
To truly recover from a trusted root key compromise, you should consider reinstalling all site servers,