cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Announcements

296
Views
0
Helpful
1
Replies
Highlighted
Rising star

How are LSC's secured (in hardware) on phones?

Hi everyone,

 

Since LSC's and their private keys are the method with which an endpoint can authenticate and receive network access, it's imporant to understand how they are in fact secured. 

 

With modern workstations such credentials are often stored in the TPM. Do such things exist in Cisco desktop phones?

 

Thanks!

Everyone's tags (2)
1 ACCEPTED SOLUTION

Accepted Solutions
Highlighted

Re: How are LSC's secured (in hardware) on phones?

This is not publically documented. Reach out to your Cisco AM/SE. They can facilitate a conversation with the BU, almost certainly under a NDA.

View solution in original post

1 REPLY 1
Highlighted

Re: How are LSC's secured (in hardware) on phones?

This is not publically documented. Reach out to your Cisco AM/SE. They can facilitate a conversation with the BU, almost certainly under a NDA.

View solution in original post

CreatePlease to create content
Content for Community-Ad
Future of Work Virtual Summit Day 5

Cisco COVID-19 Survey