Product User Guide
Intel® Remote Management Module 2 User Guide 79
7.6.4 Certificate
Figure 67: Certificate Menu
The Intel
®
RMM2 uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic
between itself and a connected client. During the connection establishment, the Intel
®
RMM2
has to expose its identity to a client using a cryptographic certificate. Upon delivery, this
certificate and the underlying secret key is the same for all Intel
®
RMM2 cards ever produced,
and certainly will not match the network configuration that will be applied to the Intel
®
RMM2
card by its user. The certificate’s underlying secret key is also used for securing the SSL
handshake, hence, this is a security risk (but far better than no encryption at all).
However, it is possible to generate and install a new base64 x.509 certificate that is unique for a
particular Intel
®
RMM2. In order to do that, the Intel
®
RMM2 is able to generate a new
cryptographic key and the associated Certificate Signing Request (CSR) that needs to be
certified by a certification authority (CA). A certification authority verifies that you are the person
who you claim you are, and signs and issues an SSL certificate to you.