Table of Contents | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
|
Overview
These certificates are used to make secure syslog protocol requests to Devo. You can use any of the certificate types that are generated when you create a new set to authorize your requests.
...
Table of Contents | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
|
These certificates are used to make secure syslog protocol requests to Devo. You can use any of the certificate types that are generated when you create a new set to authorize your requests.
...