Connector Guides › Connectors Guide › Public Key Infrastructure Connector › Entrust PKI Connector › Connector-Specific Features › How PKI Endpoints are Authenticated
How PKI Endpoints are Authenticated
There are two different ways for the PKI Connector to authenticate with Entrust PKI endpoints:
- Proxy profile approach
- Individual Entrust profile approach