Lines Matching full:hosts
231 for other hosts; however, in such cases files should always be encrypted.
289 Run the command on as many hosts as necessary.
295 Then configure the other hosts to synchronize to the TH directly or
300 All group hosts should have acyclic certificate trails ending on the TH.
360 .Ss Trusted Hosts and Groups
376 trusted hosts from which all other hosts derive synchronization
378 Trusted hosts have trusted certificates;
379 all other hosts have nontrusted certificates.
380 These hosts will automatically and dynamically build authoritative
381 certificate trails to one or more trusted hosts.
382 A trusted group is the set of all hosts that have, directly or indirectly,
398 On all other hosts do the same, but leave off the
445 Other dependent hosts will continue as usual until signatures are refreshed,
458 These schemes are based on a TA, one or more trusted hosts
459 and some number of nontrusted hosts.
460 Trusted hosts prove identity using values provided by the TA,
461 while the remaining hosts prove identity using values provided
470 In general, trusted hosts and nontrusted hosts that operate
473 Hosts that operate
486 Copy both files to all group hosts;
499 to all other hosts in the group, and recreating the soft links.
506 and certificates for all group hosts, then for every trusted host in the group,
518 Copy this file to all group hosts that operate as both servers
522 If there are no hosts restricted to operate only as clients,
549 and certificates for all group hosts, then for every trusted host
561 Copy this file to all group hosts and install a soft link
583 and certificates for all group hosts.
584 For illustration assume trish is the TA, alice one of several trusted hosts
990 to other subnet hosts.
997 or automated means on the other subnet hosts.