Previous Topic: Connector-Specific Features

Next Topic: Proxy Profile Approach

How PKI Endpoints are Authenticated

There are two different ways for the PKI Connector to authenticate with Entrust PKI endpoints: