![Red Hat NETWORK - USER 1.2 User Reference Manual Download Page 58](http://html.mh-extra.com/html/red-hat/network-user-1-2/network-user-1-2_user-reference-manual_1427549058.webp)
58
Chapter 7:Frequently Asked Questions
Hat engineers as well as the Linux community around the world through Bugzilla.
The tickets are then evaluated and resolved by the Red Hat engineering. After being
tested by the Red Hat quality assurance team, the package updates are released as
part of the Red Hat errata list. Notifications received from RHN include all Red Hat
errata.
Q: How secure is Red Hat Network?
A: Red Hat Network uses the following levels of security:
•
The Red Hat Network Web Application is only accessible with the correct user
name and password
•
A Digital Certificate is stored on the client system (/etc/sysconfig/rhn/systemid)
after registration and is used to authenticate the system during each transaction
between the client and Red Hat Network
•
All notifications and information messages are signed by Red Hat with an elec-
tronic signature using GNU Privacy Guard (GPG). RPM can be used to verify the
authenticity of the package before it is installed
•
All transactions are encrypted using a Secure Sockets Layer (SSL) connection
•
All packages are tested and verified by the Red Hat Quality Assurance Team
before they are added to the official Red Hat errata list and Red Hat Network
Q: Why do you need to know so much personal information about my system?
A: Red Hat makes every effort to allow our customers to define the relationship they
will have with us.
We require your personal information so that we can contact you easily if issues arise
affecting the security of your information or systems. In addition, sharing this in-
formation with us makes it harder for someone to steal your identity. If you should
forget your Red Hat login, you can call Customer Service to access your account.
This information will help protect your account from unauthorized access.
Your system hardware and package profiles are required to give you the most relevant
information about what affects your systems. Without these profiles, you’ll have to
sift through tons of information to find what you need.
Summary of Contents for NETWORK - USER 1.2
Page 1: ...Red Hat Network User Reference Guide 1 2 ...
Page 8: ...8 Chapter 1 What is Red Hat Network ...
Page 24: ...24 Chapter 2 Registration ...
Page 28: ...28 Chapter 3 Red Hat Update Agent Configuration Figure 3 2 Package Exceptions Settings ...
Page 52: ...52 Chapter 5 Red Hat Network Web Application ...
Page 54: ...54 Chapter 6 Red Hat Network Daemon ...
Page 62: ...62 Chapter 7 Frequently Asked Questions ...
Page 64: ...64 Index Secure Sockets Layer 7 Security 7 System Profile 16 ...