Chapter 18 Certificates

4Use a secure method to verify that the certificate owner has the same information in the Thumbprint Algorithm and Thumbprint fields. The secure method may vary according to your situation. Possible examples would be over the telephone or through an HTTPS connection.

226

 

NWA-3500/NWA-3550 User’s Guide