An organization wants to set up an internal PKI to support encrypting traffic between internal support web applications and user’s endpoint devices. A security policy requires that certificates must validate for each request to reduce the risk of an on-path attack. The business requires that the solution does not reduce the response of the web applications. Which of the following solutions would best satisfy both the security and business requirements?
Bright07
5 months ago