Dr Billwants to deploy SecureClient to remote users and wants to use certificate for authentication.
What is the proper order to properly generate and deploy user certificates on the Internal
Certificate Authority (ICA)?
1. Securely distribute the certificate.
2. Create the user.
3. Require the user to change the password protecting the certificate.
4. Generate the user certificate.
A.
4, 1, 3, 2
B.
2, 3, 4, 1
C.
3, 4, 2, 1
D.
2, 4, 1, 3
E.
1, 3, 4, 2