You can only configure the synchronization of security entities from a source to a target Platform Deployment if the source is trusted by the target. This trust is established by providing the Access to the target Platform Deployments with the source Platform Deployments' root certificate. For more information, see Circle of Trust (Cross-Instance Authentication).
Note
Before you proceed to the next step of configuring your Access Federation topologies, make sure that your target Access service is furnished with the required root certificates from the source access service.
$JFROG_HOME/artifactory/var/etc/access/keys/trusted
folder
For establishing circle of trust in a Helm installation, see Add circle of trust certificates to a Helm installation.