
- #SYMANTEC ENCRYPTION DESKTOP 10.3 2 DOWNLOAD MAC OS#
- #SYMANTEC ENCRYPTION DESKTOP 10.3 2 DOWNLOAD LICENSE NUMBER#
- #SYMANTEC ENCRYPTION DESKTOP 10.3 2 DOWNLOAD LICENSE#
- #SYMANTEC ENCRYPTION DESKTOP 10.3 2 DOWNLOAD DOWNLOAD#
All the PGP clients will be connecting with TLS via the Load Balancer, and the Load Balancer will renegotiate to the PGP servers. If a wildcard certificate is not being used and SANS Alternative Values are not available, then Symantec recommends creating the certificate for "" and assigning that certificate to the Load Balancer and have the Load Balancer renegotiate. Optionally, if a wildcard certificate is not possible, you can try adding SANS Alternative values for each PGP servers assigned. For example, the hostname "" and " will not pop a certificate warning if a wildcard certificate for ":*." was created. To avoid this scenario, you can use a wildcard certificate so that regardless of the hostname of the PGP server, as long as the domain is the same, the certificate warning will not pop up. If the TLS certificate is created for "", but the servers are called "pgp01" and "pgp02", then the PGP client is going to pop up a certificate warning. If you are using the "passthrough" method on the Load Balancer, meaning the Load Balancer will not be presenting any certificates for the TLS connection and is simply sending to one of the two PGP Servers, ensure the certificate that is being used matches the same FQDN used to create the client. Post install, when the PGP client attempts to check in, it will attempt to resolve the PGPSTAMP value, or "" FQDN, which will go to the Load Balancer.Īt this point, you want to think about how the TLS communications should behave.īecause the PGPSTAMP is pointing to "", the TLS certificate being used for the interface should also match "", whether it is the PGP Server that presents the TLS certificate or the Load Balancer. So when you build the PGP client, enter this hostname and this will assign "" for the installer package, this is called the "PGPSTAMP", which is the FQDN for the PGP Server. In one example, we could call the Load Balancer FQDN "". For example, if you have two PGP Servers, one called "" and the other "", you'll want to use a name that will resolve to the Load Balancer and then Load Balancer will then redirect traffic to one of the two servers in question. If you are using a Load Balancer to route communications to the PGP server, enter the FQDN the Load Balancer will be using. Section 2 of 4: Load Balancers - TLS Passthrough VS TLS Renegotiation, Wildcard Certificate VS Single FQDN Certificate:

The Encryption Management Server you are using to create the installer is listed by default.
#SYMANTEC ENCRYPTION DESKTOP 10.3 2 DOWNLOAD LICENSE#
If you choose this option, the user will be in charge of managing their own license number, PGP keys, etc. If this is not checked, it will create a "Standalone/Unmanaged" client that will not communicate with the PGP Server.
#SYMANTEC ENCRYPTION DESKTOP 10.3 2 DOWNLOAD MAC OS#
#SYMANTEC ENCRYPTION DESKTOP 10.3 2 DOWNLOAD LICENSE NUMBER#
If you wand Standalone, leave the box unchecked, and you will be prompted for the usual standalone setup that requires a license number to be entered This is a critical step if you wish to have your PGP Client managed by the PGP Server.
#SYMANTEC ENCRYPTION DESKTOP 10.3 2 DOWNLOAD DOWNLOAD#
If you do not click the Customize option, then it will download a standalone client, and you will not get the usual enrollment wizard to bind your PGP Client with the PGP server. When you click the "Customize" box, this will create the client that will communicate directly with your own PGP server using a unique FQDN.

The Download Symantec Encryption Clients screen is displayed: On this page above, click Download Client button.Click Consumers, and then click Groups:.Login to the Encryption Management Server administrative interface.This is the best option to use if Directory Synchronization is being used to enroll clients. The Auto-Detect Policy option means that when the user enrolls with the server, the policy is automatically applied. Section 1 of 4: Creating an Installer with Auto-Detect Policy

The PGP Server can allow you to create two client installer types: Auto Detect and Preset Policy-the former being the most widely used and recommended option. You create PGP Desktop client installers with the features and settings that support your organization's security requirements and then deploy those client installers to your end users. The Symantec Encryption Management Server (SEMS/PGP Server) manages all of the Symantec Encryption Desktop (SED/PGP Desktop) clients that are deployed to the environment.
