PKI Pre-Installation Guide
Version 2.0.0
Page iii
5.6.1 Email
Signing........................................................................................................ 23
5.6.2 Email
Encryption .................................................................................................. 24
5.6.3 Results................................................................................................................... 24
6
PKI/AD Scan to Network Configuration.............................................................................. 26
6.1 General
Settings ............................................................................................................ 26
6.2 Fileshare
Settings.......................................................................................................... 26
6.3 Fileshare
Examples ....................................................................................................... 28
7 Finding
Configuration
Information....................................................................................... 30
7.1 Kerberos
Realm ............................................................................................................ 30
7.2 Domain
Controller ........................................................................................................ 30
7.3 Kerberos
Configuration
File ......................................................................................... 31
7.4 LDAP
Directory
Information........................................................................................ 33
7.5 Domain
Controller Certificates..................................................................................... 33
8 Custom
LDAP
Configurations.............................................................................................. 34
8.1 LDAP
Configuration
1.................................................................................................. 35
8.2 LDAP
Configuration
2.................................................................................................. 36
8.3 LDAP
Configuration
3.................................................................................................. 37