3 Security configuration issues

This section describes security configuration issues you must consider when implementing XCA.