
Device Configuration 5 - 101
5.6 Assigning Certificates
A certificate links identity information with a public key enclosed in the certificate.
A
certificate authority
(CA) is a network authority that issues and manages security credentials and public keys for
message encryption. The CA signs all digital certificates it issues with its own private key. The corresponding public key
is contained within the certificate and is called a CA certificate. A browser must contain this CA certificate in its Trusted
Root Library so it can trust certificates signed by the CA's private key.
Depending on the public key infrastructure, the digital certificate includes the owner's public key, the certificate expiration
date, the owner's name and other public key owner information.
Each certificate is digitally signed by a trustpoint. The trustpoint signing the certificate can be a certificate authority,
corporation or individual. A trustpoint represents a CA/identity pair containing the identity of the CA, CA-specific
configuration parameters, and an association with an enrolled identity certificate.
SSH keys are a pair of cryptographic keys used to authenticate users instead of, or in addition to, a username/password.
One key is private and the other is public key.
Secure Shell
(SSH) public key authentication can be used by a client to access
resources, if properly configured. A RSA key pair must be generated on the client. The public portion of the key pair resides
with the licensed device, while the private portion remains on the client.
The certificate configuration used by an access point managed device can be changed (overridden) as changes in security
credentials require modification in the management of the device.
To configure a certificate override configuration:
1. Select the
Configuration
tab from the Web UI.
2. Select
Devices
.
3. Select
Device Overrides
.
4. Select a target device MAC address from the Device Browser in the lower, left-hand, side of the UI.
5. Select
Certificates
from the Device menu.
Summary of Contents for Solutions WiNG 5.2.6
Page 1: ...Motorola Solutions WiNG 5 2 6 Access Point System Reference Guide ...
Page 2: ......
Page 14: ...1 4 WiNG 5 2 6 Access Point System Reference Guide ...
Page 26: ...2 12 WiNG 5 2 6 Access Point System Reference Guide ...
Page 46: ...3 20 WiNG 5 2 6 Access Point System Reference Guide ...
Page 247: ...Device Configuration 5 189 Figure 5 102 Profile Overrides Management Settings screen ...
Page 264: ...6 2 WiNG 5 2 6 Access Point System Reference Guide Figure 6 1 Configuration Wireless ...
Page 392: ...7 32 WiNG 5 2 6 Access Point System Reference Guide ...
Page 438: ...8 46 WiNG 5 6 2 Access Point System Reference Guide ...
Page 514: ...12 12 WiNG 5 2 6 Access Point System Reference Guide Figure 12 6 RF Domain Health screen ...
Page 533: ...Statistics 12 31 Figure 12 18 RF Domain Smart RF Energy Graph ...
Page 597: ...Statistics 12 95 Figure 12 54 Access Point Certificate Trustpoint screen ...
Page 626: ...12 124 WiNG 5 2 6 Access Point System Reference Guide ...
Page 628: ...A 2 WiNG 5 2 6 Access Point System Reference Guide ...
Page 669: ......