Main Nav

Apr 16th, 2008
4:30 PM - 5:30 PM
Assembly Room
Mountain Time
Having PKI-authenticated applications is not enough. In this session, we will discuss how applications have been PKI enabled and how they have been accepted and used. You will hear from institutions that have implemented and maintain multiple applications that are PKI authenticated and are well accepted by their user community.