cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
584
Views
0
Helpful
1
Replies

How are LSC's secured (in hardware) on phones?

Nadav
Rising star
Rising star

Hi everyone,

 

Since LSC's and their private keys are the method with which an endpoint can authenticate and receive network access, it's imporant to understand how they are in fact secured. 

 

With modern workstations such credentials are often stored in the TPM. Do such things exist in Cisco desktop phones?

 

Thanks!

1 Accepted Solution

Accepted Solutions

Jonathan Schulenberg
Hall of Fame
Hall of Fame
This is not publically documented. Reach out to your Cisco AM/SE. They can facilitate a conversation with the BU, almost certainly under a NDA.

View solution in original post

1 Reply 1

Jonathan Schulenberg
Hall of Fame
Hall of Fame
This is not publically documented. Reach out to your Cisco AM/SE. They can facilitate a conversation with the BU, almost certainly under a NDA.
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: