3KeyNote 2024
-
Public Certificate Monitoring and Transparency
Jan TomášekDone
-
Break
Done
-
Welcome Note
Done
-
Registration and Breakfast
Done
-
Future-Proofing Security with Crypto Agility
Giulio GennariDone
-
Networking
Organizers, Participants, Partners, AttendeesDone
-
Building a Robust Cryptography Inventory for the Post-Quantum Era
Roman CinkaisDone
-
Future Forward: Unveiling Our Roadmap for PKI, PCI, and Encryption
3Key TeamDone
-
Leveraging eIDAS Solutions for Faster Digitalization and Enhanced Document Security
Jack PiekarskiDone
-
Mastering Cryptography in Compliance Standards
Michal TutkoDone
Roles, RA Profiles and Groups are crucial for definition of user permissions, certificates properties, assignment to certification authorities and notifications. There may be several ways to set principles on how this can be implemented and used in CZERTAINLY. Key to efficient implementation of CZERTAINLY into an organization is to transfer organization structure and split of responsibilities logic into CZERTAINLY setup. Important is also to keep this setup in line with the organization changes and evolvement. During the demonstration I will explain Roles, RA Profiles and Groups and relations between them. I will also show an example, how to use CZERTAINLY's API to automatically synchronize structure defined in Active Directory into CZERTAINLY configuration.