Wednesday, April 16 | 5:30PM–6:30PM | Assembly Room
Having PKI-authenticated applications is not enough. In this session, we will discuss how applications have been PKI enabled and how they have been accepted and used. You will hear from institutions that have implemented and maintain multiple applications that are PKI authenticated and are well accepted by their user community.
AVP and Chief Enterprise Architect, University of Virginia
Senior Manager, Systems Analysis and Programming, The University of Texas Health Science Center at Houston