O'Reilly logo

IT Inventory and Resource Management with OCS Inventory NG 1.02 by Barzan Tony Antal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing the process with SSL certificates

Now, we will cover the internal working of SSL certificates. As explained earlier, these are required as they enhance the security of deployment. Those info XML files are grabbed through HTTP over SSL protocol. We have two options to set up such a necessary SSL system.

Either we are going to work with self-signed certificates, or we opt for a more refined solution via the typical Public Key Infrastructure (PKI) scheme, having the certificate signed by a certificate authority (CA). In the very essence, the public key is linked with an identity. After that, anyone can verify whether that key really belongs to that identity. Therefore, it acts as a digital signature.

Describing in detail how the PKI scheme ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required