Security Configurations - Deployment Scenarios

To achieve the security on the system level and its various components, you need to configure certificates when performing various deployment configurations.

Securing the certificates using SSL certificates ensures encrypted communication.
For example, configuring certificates between a web browser and a web server (IIS) authenticating the identity of the website.

The following table helps you map the certificate types and the certificates stores with various deployment scenarios:

System Certificate Deployment Scenarios

Deployment Scenario

Certificate Type

Local Computer

Current User

TRCA

Personal

TRCA

Personal

Server Data Master

Root

X

 

X

 

Host

 

X

 

 

Distribution Participant Server

Root

X

 

X

 

Host

 

X

 

 

Client/FEP

Root

X

 

X

 

Host

 

X

 

 

Remote SQL Server

Root

X

 

X

 

Host

 

X

 

 

Remote IIS for Web/Windows App Clients

Root

X

 

X

 

Self-Signed

X

X

X

 

Identified Web Client

Root

X

 

X

 

Host

 

X

 

 

Self-Signed

X

X

X

 

Anonymous Web Client

Root

 

 

 

 

Self-Signed

X

X

X

 

Identified Flex Client

Root

X

 

X

 

Host

 

X

 

X

Anonymous Flex Client

Root

 

 

 

 

Host

 

 

 

X

Remote IIS for Mobile App Clients

Root

X

 

X

 

Host

 

X

 

X