To validate a user certificate, configure an X.509 client certificate authentication scheme to authenticate a user when they request a protected resource.
Review the instructions for setting up an X.509 client certificate authentication scheme.
The instructions for configuring CRLs and OCSP are described in the sections that follow.
Copyright © 2015 CA Technologies.
All rights reserved.
|
|