Symantec 14541094 User Guide - Page 210
Configuring pcAnywhere to use public-key encryption
UPC - 037648640480
View all Symantec 14541094 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 210 highlights
210 Securing your computer and sessions Using encryption to protect data This option is not applicable for pcAnywhere encoding. 6 Click OK. Configuring pcAnywhere to use public-key encryption In public-key encryption, pcAnywhere uses a digital certificate to verify the identity of the person who is attempting to connect and send data. It then uses symmetric encryption algorithms to secure the session. Some configuration is required to ensure that both the host and remote users have access to the appropriate key pairs. To use public-key encryption in pcAnywhere, the host and remote users must do the following: ■ Provide each other with copies of their digital certificates. ■ Set up a certificate store that contains the certificates of those users who will connect to their computers. ■ Locate certificates and private keys when the host computer is running as a service. ■ Configure a connection item to use public-key encryption. When you select public-key encryption, pcAnywhere only allows connections with computers that are also using public-key encryption. Connections with computers that are set to any other encryption level are denied. Creating a certificate file to send to another user Certificates are data documents that contain identification information that includes the user's name, public key, issuing authority, and data signature. Symantec pcAnywhere requires that you use Microsoft-compatible certificates. You can obtain these from a commercial certificate authority (for example, VeriSign or Entrust) or from an internal certificate server. You can create a certificate file by exporting your certificate in Microsoft Internet Explorer. Use any export format that does not include the private key (for example, PKCS#7 with a .p7b file extension). Send the file to the computer to which you want to connect using a secure method. Alternatively, the other user can download your certificate from the certificate authority. Follow the certificate authority's instructions for finding and downloading another user's certificate.