cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
691
Views
0
Helpful
1
Replies

How are LSC's secured (in hardware) on phones?

Nadav
Level 7
Level 7

Hi everyone,

 

Since LSC's and their private keys are the method with which an endpoint can authenticate and receive network access, it's imporant to understand how they are in fact secured. 

 

With modern workstations such credentials are often stored in the TPM. Do such things exist in Cisco desktop phones?

 

Thanks!

1 Accepted Solution

Accepted Solutions

Jonathan Schulenberg
Hall of Fame
Hall of Fame
This is not publically documented. Reach out to your Cisco AM/SE. They can facilitate a conversation with the BU, almost certainly under a NDA.

View solution in original post

1 Reply 1

Jonathan Schulenberg
Hall of Fame
Hall of Fame
This is not publically documented. Reach out to your Cisco AM/SE. They can facilitate a conversation with the BU, almost certainly under a NDA.