Obtaining a user certificate
Private key and certificate credentials are required to access a system with security.
Your organization’s security administrator has already begun the credentials process. Now, the user to receive those credentials joins the final steps.
In this section, the certificate authority is the security administrator, which is called the customer CA.
By this time, the security administrator has created a User Information File for each user to be given access to the system running security.
Each user receives an email with an attached file or the PEM version. This is pasted onto the emailed message. This attachment, or pasted text, is the user information file.