tailieunhanh - Review the detailed steps covered in the demonstration.

Connect to https://partner/securit y and present the Certcomputer (where computer is the NetBIOS name of your computer) certificate for authentication. | Designing a Public Key Infrastructure Detailed Steps Review the detailed steps covered in the demonstration. Tasks Detailed Steps Important Perform the following procedures at both partner computers. 1. Log on as certcomputer and connect to the site http partner security where partner is the NetBIOS name of your partner s computer by using Internet Explorer. a. Ensure that you are logged on as certcomputer where computer is the NetBIOS name of your computer with a password of password. b. Double-click Internet Explorer on the desktop. c. In the address bar type http partner security wherepartner is the NetBIOS name of your partner s computer . Can you access the Web site Why or why not O No. The http par ner security Web site has been configured to require a secure channel therefore the Web browser must specify the Uniform Resource Locator URL by using https ZZpartner security. 2. Connect to https partner securit y and present the Certcomputer where computer is the NetBIOS name of your computer certificate for authentication. d. In the address bar type https parZner security e. In the Security Alert dialog box click OK. f. In the Client Authentication dialog box ensure that the Certcomputer where computer is the NetBIOS name of your computer certificate is selected and then click OK. g. Close Internet Explorer and log off. Copyright 2002 Microsoft Corporation. All Rights Reserved. Designing a Public Key Infrastructure Tasks Detailed Steps Can you access the Web site Did you need to type credentials Yes the Web site can be accessed. No there was no need to type credentials because the certificate provided your credentials for the Web site. Could the account mapping for the certificate have been performed differently If so what are advantages or disadvantages of the other method or methods Yes. You could have created the certificate mapping by using Active Directory Users and Computers. The advantage of this is that any PKI-based application within the forest could .