Security Configurations - Deployment Scenarios
To achieve the security on the system level and its various components, you need to configure certificates when performing various deployment configurations.
Securing the certificates using SSL certificates ensures encrypted communication.
For example, configuring certificates between a web browser and a web server (IIS) authenticating the identity of the website.
The following table helps you map the certificate types and the certificates stores with various deployment scenarios:
System Certificate Deployment Scenarios | |||||
Deployment Scenario | Certificate Type | Local Computer | Current User | ||
TRCA | Personal | TRCA | Personal | ||
Server Data Master | Root | X |
| X |
|
Host |
| X |
|
| |
Distribution Participant Server | Root | X |
| X |
|
Host |
| X |
|
| |
Client/FEP | Root | X |
| X |
|
Host |
| X |
|
| |
Remote SQL Server | Root | X |
| X |
|
Host |
| X |
|
| |
Remote IIS for Windows App Client | Root | X |
| X |
|
Self-Signed | X | X | X |
| |
Identified Flex Client | Root | X |
| X |
|
Host |
| X |
| X | |
Anonymous Flex Client | Root |
|
|
|
|
Host |
|
|
| X | |
Remote IIS for Mobile App Clients | Root | X |
| X |
|
Host |
| X |
| X |