Security; Pki Certificates; How Pki Certificates Are Used - Polycom Pano Administrator's Manual

Wireless presentation system
Hide thumbs Also See for Pano:
Table of Contents

Advertisement

Security

Topics:

PKI Certificates

Change Local Account Credentials
Disable the Security Code
Wireless Communication Options
Port Usage
Encryption
For detailed information about configuring security settings, see the following topics.
Related Links
Access the System Web Interface
PKI Certificates
If your organization uses a public key infrastructure (PKI) for securing network connections, Polycom
recommends that you have a strong understanding of certificate management and how it applies to your
Pano system.

How PKI Certificates Are Used

PKI certificates authenticate secure network connections to and from the Pano system. Standard PKI
techniques are used to configure and manage certificates and certificate signing requests (CSRs). ANSI
X.509 standards regulate the certificate characteristics.
Your Pano system can generate CSRs to send to a certificate authority (CA), a trusted entity that
validates and officially issues, or signs, PKI certificates. The Pano system uses those certificates for client
and server authentication.
If your system is in an environment without a PKI, you do not need a CA-signed certificate; the system
comes with a self-signed certificate for its TLS connections. When a PKI is deployed, however, self-
signed certificates are not trusted and CA-signed certificates are needed.
Here are some examples of how you would use PKI certificates:
If your environment uses the 802.1X authentication framework for wired connections, you would
need to create a CSR and install the resulting CA-signed certificate on your system so it is trusted
on the network.
If you want to navigate with your browser over a secure connection to the Pano system web
interface, you would need to create a CSR and install the resulting CA certificate chain on your
system to replace its factory-installed certificate, which is not trusted.
If you want to provision your system using RealPresence Resource Manager in a secure
environment.
Polycom, Inc.
on page 9
30

Advertisement

Table of Contents
loading

Table of Contents