Defining Trusted Root Certificates
An Intel AMT system must have a trusted root certificate to use any of these features:
- Remote Access using a Management Presence Server
- Mutual authentication in Transport Layer Security
- Most types of 802.1x setups
To define the trusted root certificates:
- From the relevant feature window, click Edit List. The Trusted Root Certificates Used In Profile window opens.
- To add a trusted root certificate, click Add. The Add Trusted Root Certificate window opens.
- Select one of these:
- From Certificate Authority – From the drop-down list, select the Trusted Root Certification Authority (CA).
- From File – Enter the path to the file or click Browse to locate and select a certificate. The file must be in base64 PEM format.
Note: |
---|
You can only add a certificate from a CA if the certificate is self-signed and the CA is a root CA. You cannot add a certificate from a subordinate CA. |
- Click OK. The Path to Root Certificate window closes and the certificate shows in the Trusted Root Certificates Used In Profile window.
- Select the check box of at least one of the trusted root certificates in the list.
- Click OK. The Trusted Root Certificates Used In Profile window closes.