Communications: Security Keys
Last updated
Last updated
Security keys are used to verify, authenticate, and encrypt communications and content within your ePO-managed environment. The ePO server relies on three security key pairs to verify and authenticate communications and content within your ePO environment. These security key pairs are used to:
路 Authenticate agent鈥憇erver communication
路 Verify the contents of local repositories
路 Verify the contents of remote repositories
Each key pair has:
路 A secret key that signs messages or packages at the source
路 A public key that verifies the messages or packages at the target