All, One of my customers is looking to move their estate of Mobile computers from WPA-PSK to a WPA2-Enterprise solution using certificates. They want to use a machine certificate which will obviously be different for every device but typically you would need to get the device onto a network in order to get the certificate in the first place. I wanted to see just how many of our customers have started deploying certificate based authentication, and how are they going about managing the deployment and initial configuration, and then the ongoing management of certs when they expire or need revoking. If you have any experience of this in a large scale deployment (we are looking at potentially in excess of 10,000 devices) your knowledge and expertise would be most appreciated. Thanks IJ
Certificate usage |
0 Replies