Примеры использования Trusted root на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Trusted Root Certificates.
To remove the trusted root key.
Trusted Root Certification Authorities.
Describes how to verify the trusted root key.
Manage Trusted Root Certificates.
Люди также переводят
Describes how to remove the trusted root key.
Trusted root key management is not required.
How do clients obtain the trusted root key?
Managing trusted root certificates for a domain.
How do clients refresh the trusted root key?
To manage trusted root certificates for a domain.
To verify the installation of the trusted root key.
Install the Trusted Root Certificate TrustedRoot. crt.
How do management points obtain the trusted root key?
The built-in Trusted Root Certificates list is renewed.
Describes the procedure to remove the trusted root key.
Lists the available trusted root certification authorities(CAs).
The management point's certificate signed by the trusted root key.
Again choose Install Trusted Root Certificate into Key Ring.
Trusted root certificates from CAs other than Microsoft and your organization.
What should you do if your trusted root key is compromised?
Managing trusted root certificates for a local computer.
Describes how to preprovision the trusted root key on clients.
To manage trusted root certificates for a local computer.
This certificate should be issued from a trusted root certification authority.
Removes the trusted root key for the Configuration Manager 2007 client.
Use a certificate trust list to define the trusted root certification authorities.
Trusted root CAs have passed through multiple layers of verification and are considered the most secure.
Then click"Browse" and select"Trusted Root Certification Authorities.
The trusted root key provides a mechanism for clients to verify the authenticity of the management point and its certificate if they cannot query Active Directory Domain Services.