![]() It can be used as a basis to expand the certificate deployment into other applications. ![]() This document describes techniques to deploy the Zscaler Root Certificate into these applications. ![]() ![]() However, a number of applications do not read the system certificate store – for example Python – and moreover developer tools such as Docker need to have the Root certificate installed in order for the applications which run there to trust the synthetic certificates. Zscaler App is deployed on Windows and Mac devices and the Zscaler certificate is installed in the appropriate system Root Certificate Store so that the system/browser trusts the synthetic certificate generated during TLS Inspection. Enterprises utilise TLS inspection for Advanced Threat Protection, Access controls, Visibility, and Data-Loss Prevention. ![]() Over 90% of websites now use TLS encryption (HTTPS) as the access method. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |