Alternate licensing method

The security administrator also has the alternative of creating and distributing user credentials without individual user participation. This second method eliminates the requirement for these users to master the procedures to creating private keys, public keys, and the certificate request. The CA is responsible for all keys.