§Description:
□Ensure
Trust with Field and Center System
Users and with Other Cores
▪Mobile
User credentials handled outside Core
□Management
of credentials, including X.509 digital certificates,
CRLs, and assignment and recognition of credential-related
roles (i.e., registration versus certificate distribution)