Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Home
  • Attend
    • Registration
    • Discounts
    • Venue, Hotel, and Travel
    • Why Attend?
    • Students and Grants
  • Program
    • Program at a Glance
    • Conference Program
    • Training Program
      • Training Program - Details
    • Workshops
    • Conference Topics
      • Systems and Network Engineering
      • Monitoring and Metrics
      • SRE and Software Engineering
      • Culture
    • UCMS '15
    • URES '15
    • Puppet Camp DC
  • Activities
    • Birds-of-a-Feather
    • LISA Build
    • LISA Lab
  • Sponsors and Expo
    • LISA15 Expo
    • Sponsor and Exhibitor List
    • Exhibitor Services
  • Participate
    • Call for Participation
    • Call for Research Papers and Posters
      • Submitting Papers and Posters
    • Speaker Resources
  • About
    • Conference Organizers
    • Help Promote
    • Services
    • Code of Conduct
    • Past Conferences

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

Why Attend LISA?

"No matter if you are dealing with the latest tech or trying to maintain something from the dark ages of the ‘90s, there are people at LISA who are experienced with it. Heck, many of the people who _developed_ this tech attend. This is a great place to get answers and ideas."

Lee Damon, University of Washington

"This was my first LISA. It was great attending a conference that focused on my role without trying to shoehorn every challenge into a specific vendor's solution. The same mix of awesome sessions, speakers, and other attendees will bring me back every year."

LISA14 Attendee

"Great sessions, great presenters, great community. I feel like I can make up a year of following news and forums on the subject in a week."

LISA14 Attendee

"I like seeing where the industry is heading, how SysAdmins/engineers are evolving, tools they are using, common problems and solutions across the world."

LISA14 Attendee

"In a world where technology changes rapidly, it's hard to find great resources for in-depth expertise. LISA has a terrific combination of people who create the technology and people who implement it effectively for their companies."

Matt Simmons, Northeastern University

"LISA is the home of ops people who do ops correctly. I’m always motivated by the conference content and hallway conversations to be better, and I take home the knowledge needed to move closer to that goal. "

Tony Del Porto, Cisco Systems, Inc.

"If you're a sysadmin slaving away in a metaphorical basement and re-inventing the wheel every time your employer's business goals change slightly, LISA will help pull you into the light."

Marc Chiarini, Long-Time IT Admin and Researcher, MarkLogic Corp

"LISA is the best mix of training, talks, and networking of any events I've been to. That's the reason I've been to 11 of them.”

LISA14 Attendee

help promote

LISA16 CFP button

Get more
Help Promote graphics!

sponsors

Gold Sponsor
Gold Sponsor
Gold Sponsor
Gold Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
General Sponsor
General Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner
Industry Partner
Industry Partner
Industry Partner
Industry Partner
Industry Partner

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

twitter

Tweets by @LISAConference

You are here

Home » Cloudy with a Chance of Security: PKI in the Age of Distributed Computing
Tweet

connect with us

Cloudy with a Chance of Security: PKI in the Age of Distributed Computing

Mini Tutorial
Friday, November 13, 2015 - 2:00pm-3:30pm

Brian J. Atkisson, Red Hat, Inc.

Brian J. Atkisson, Red Hat, Inc.

Brian J. Atkisson has 15 years of production systems engineering and operations experience, focusing primarily on identity management and virtualization solutions. He has worked for the University of California, Jet Propulsion Laboratory, and Red Hat, Inc. He is a Red Hat Certified Architect and Engineer, in addition to holding many other certifications and a B.S. in Microbiology. He currently is a Principal Systems Engineer on the Identity and Access Management team within Red Hat IT.

Description: 

This mini tutorial will introduce basic concepts of PKI, and cover the installation and configuration of Dogtag Certificate System, a robust, feature-rich and open source end-to-end PKI solution. Certificate use cases with a focus on cloud-based applications will be discussed and evaluated.

Who should attend: 

System administrators, engineers, and security professionals looking to learn more about using and deploying PKI within traditional enterprise and cloud environments should attend.

Take back to work: 

In this tutorial, you will learn to install and use Dogtag Certificate System, receive a reference architecture, and be exposed to new use cases within cloud deployments.

Topics include: 
  • Why use PKI and where it fits in today's enterprise environment
  • Dogtag component overview
  • Typical architecture and best practices
  • Installation and configuration
  • Cloud use-cases and benefits
  • Traditional RSA vs. ECC certificates, recommended uses and deployment strategies
  • Log in or    Register to post comments

Gold Sponsors

Silver Sponsors

Bronze Sponsors

General Sponsors

Media Sponsors & Industry Partners

© USENIX

LISA is a registered trademark of the USENIX Association.

  • Privacy Policy
  • Contact Us