Polycom CMA System Operations Guide

For more information on performing each of these tasks, see the Polycom CMA

System Upgrade Guide.

Manage Certificates

Certificates are a security technology that assists networked computers in determining whether to trust each other. Each digital certificate is identified by its public key. The collection of all public keys used in an enterprise to determine trust is known as a Public Key Infrastructure (PKI).

To manage digital certificates, an enterprise must:

Establish a Public Key Infrastructure using one or more Certificate Authorities (CA). Typically, an enterprise’s IT department has a CA but commercial CAs may be used as well.

Configure each computer that participates in the PKI with a digital certificate that identifies it. The certificate must be signed by one of the CAs in the PKI

Configure each computer that participates in the PKI to trust the PKI's Certificate Authorities

Ensure that the PKI is used to protect data exchange by configuring each system to use encryption protocols such as Secure Sockets Layer (SSL) and/or Transport Level Security (TLS).

Certificates Accepted by the Polycom CMA System

By default, to support encrypted communications and establish a minimum level of trust, the CMA system presents a self-signed digital certificate to its clients. This default certificate will typically not be trusted by clients. Web browsers that connect to the CMA system user interface will display a warning regarding the certificate.

Participation in a Public Key Infrastructure requires a CMA system to have been configured with at least one root CA certificate, a current certificate revocation list (CRL) from the CA, and a digital certificate signed by the CA that identifies the CMA system.

446

Polycom, Inc.

Page 466
Image 466
Polycom 3725-77601-001H manual Manage Certificates, Certificates Accepted by the Polycom CMA System