Modifying the signatory of a security policy

Before they are deployed on user stations with the signatory certificate, security policies are signed by a policy signatory. This guarantees the authenticity and integrity of policies.

For more information, refer to the section Signing security policies.

Apply the following procedure to modify the signatory of a policy, e.g. if the signatory's signature is compromised or if the signatory leaves the company.

The following conditions are required: