

You can upload certificates to PCoIP Zero Clients and PCoIP Remote Workstation Cards for connection verification, such as PCoIP Management Console 2.x and 3.x validation, Cloud Access Software, View Connection Server (VCS) authentication and IEEE 802.1x network authentication. Installing certificates on PCoIP Zero Client and PCoIP Remote Workstation Cards devices:

Installing a trusted SSL root certificate of the signing CA in the PCoIP Zero Clients for server authentication. Secure firmware upload that's encrypted using 128-bit AES GCM and signed using the pre-installed PCoIP Root CA. Installing the PCoIP root CA certificate in browsers used to manage PCoIP devices. These certificates can't be removed and the private keys are not distributed so they can't be used for View Connection Server or IEEE 802.1x authentication.įive of the most common certificate management scenarios in a PCoIP protocol deployment are: Note: PCoIP Zero Clients and PCoIP Remote Workstation Cards are highly secure devices and by default they do not contain any trust store entries other than the base Teradici PCoIP root CA certificates.
