About Work Types
Work Types tell Trust Protection Platform when and how to perform specific tasks that make SSH keys and certificate management significantly easier. You can configure several types of work, listed in the table below.
After defining work, you then assign it to specific groups. A single work type can be used across multiple groups; but group types are designed to support specific kinds of work.
Which group and work types are used together is shown in the table below, Work Types and associated Group Types.
See About Group Types to learn more about the Trust Protection Platform components required in order to perform all work types.
Work Type |
Description |
Associated Group Type |
For configuration information, see... |
---|---|---|---|
Agent Connectivity |
Configure how and when installed Server Agents should check in with the Trust Protection Platform server. Reassign which Trust Protection Platform server the Server Agents should report to. Set the Logging Threshold and specify the minimum logging disk space requirements . |
|
|
Agent Upgrade |
Enable or disable upgrading of installed Server Agents to the latest available version. |
|
|
Certificate Device Placement |
Configure work for placing discovered devices and certificate installations into specific device policy folders. |
|
|
Certificate Discovery |
Configure the method (agent-based versus agentless) and related behavior for discovering certificates. |
|
|
Certificate Enrollment via EST Protocol |
Configure work for certificate enrollment for devices using the Enrollment over Secure Transport (EST) protocol. |
|
Example: Configuring EST for Cisco devices |
Certificate Installation |
Configure certificate installation (provisioning) work. |
|
|
Dynamic Provisioning |
Configure work for creating, installing, and monitoring a certificate. This work also automatically creates all of the necessary objects in Trust Protection Platform. |
|
|
SSH Device Placement |
Configure work for placing device objects for the needs of SSH key management into specific device policy folders. |
|
|
SSH Discovery |
Configure work for discovering SSH keys. |
|
|
SSH Key Usage |
Configure work for discovering and reporting SSH key usage details. |
|
|
SSH Remediation |
Configure work for discovering and reporting SSH key remediation details. |
|