Symantec 14541094 User Guide - Page 212
Configuring a connection item to use public-key encryption
UPC - 037648640480
View all Symantec 14541094 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 212 highlights
212 Securing your computer and sessions Using encryption to protect data When you run the Public Key Encryption Wizard after using MachKey, you can select the certificates that you copied to the local computer's certificate store. To locate certificates and private keys 1 In Windows Explorer, locate and double-click the following file: \\Program Files\Symantec\pcAnywhere\MachKey.exe 2 In the MACHKEY Certificate Copy Utility dialog box, under My store, select the certificates that you want to copy to the local computer's certificate store. The host computer retrieves the public key from the certificate file on the remote computer. If the host is configured to run as a service, that certificate file must be in a location that can be accessed by a service (for example, a local hard drive). See "Setting the host startup options" on page 80. 3 Click Copy to Machine Store. 4 Close the MACHKEY Certificate Copy Utility. Configuring a connection item to use public-key encryption Public-key encryption requires both the host and remote users to have a digital certificate issued by a mutually trusted certificate authority. The host and remote users must set up a connection item file that includes information about the digital certificate. When you select public-key encryption, you also select the algorithm type and key length. Larger key lengths provide stronger levels of security but might impact performance. See "Understanding the performance trade-offs" on page 206. Symantec pcAnywhere provides a Public Key Encryption Wizard to guide you through the configuration, or you can manually configure this information. To manually configure a connection item to use public-key encryption 1 In the Symantec pcAnywhere window, in Advanced View, do one of the following: ■ To configure a host computer to use public-key encryption, on the left navigation bar, click Hosts. ■ To configure a remote computer to use public-key encryption, on the left navigation bar, click Remotes. 2 In the right pane, right-click the connection item that you want to configure, and then click Properties.