Authenticating the Agents
As a system administrator, follow these steps to configure your system to apply the level of security that is appropriate for your company.
-
Define the method that will be used to authenticate the Agents. This determines the level of security.
-
Define the method that will be used to generate the Authentication Key.
-
Authenticate the Agents using the defined method.
See Authenticating.
-
If an Agent is compromised or if you want to upgrade it, you must first withdraw its authentication.
-
In some cases you will have to renew the Transfer Key, for example after an Agent upgrade.
-
If necessary, you can change the authentication method later on.
See also: