|
The machine can generate the key and certificate (server certificate) used for TLS encrypted communication. If you want to start using TLS encrypted communication immediately, it is convenient to use the key and certificate that are preinstalled in the machine. If necessary, have an administrator generate a key and certificate. Note, however, that TLS encrypted communication is not enabled simply by generating a key and certificate. Configuring the Key and Certificate for TLS
|
NOTE
|
If you want to use a server certificate with a CA signature, you can generate the key along with a CSR, instead of the certificate. Generating a Key and CSR
|
NOTE
|
Managing keys and certificates
You can check the detailed settings or delete keys and certificates on the screen that is displayed when you press <Management Settings> <Device Management> <Certificate Settings> <Key and Certificate List>. If the list of keys and certificates is not displayed, press <Key and Certificate List for This Device> to display it.
If is displayed, the key is corrupted or invalid.
If is not displayed, the certificate for the key does not exist.
If you select a key and certificate and press <Certificate Details>, detailed information about the certificate is displayed. You can also press <Verify Certificate> on this screen to check whether the certificate is valid.
To delete keys and certificates, select the ones that you want to delete, and press <Delete> <Yes>.
|