![]() |
|
The machine can generate the key and certificate (server certificate) used for TLS encrypted communication. If you want to start using TLS encrypted communication immediately, it is convenient to use the key and certificate that are preinstalled in the machine. If necessary, have an administrator generate a key and certificate. Note, however, that TLS encrypted communication is not enabled simply by generating a key and certificate. Configuring the Key and Certificate for TLS
|
|
NOTE
|
|
If you want to use a server certificate with a CA signature, you can generate the key along with a CSR, instead of the certificate. Generating a Key and CSR
|
.
<Device Management>
<Certificate Settings>
<Generate Key>
<Generate Network Communication Key>.
<Key Name>
<Signature Algorithm>
, and <Key Length (bit)> is set to <1024> or more for
, the SHA384 and SHA512 hash algorithms can be selected.
<Key Algorithm>
. If <ECDSA> is selected, <Key Type> is displayed instead.
<Key Length (bit)> / <Key Type>
, or specify the key type if <ECDSA> is selected. In both cases, a higher value provides greater security but reduces the communication processing speed.
<Validity Start Date> / <Validity End Date>
<Country/Region>/ <State> / <City> / <Organization> / <Organization Unit>
<Common Name>|
NOTE
|
|
Managing keys and certificates
You can check the detailed settings or delete keys and certificates on the screen that is displayed when you press
<Management Settings> <Device Management> <Certificate Settings> <Key and Certificate List>. If the list of keys and certificates is not displayed, press <Key and Certificate List for This Device> to display it.If
If
If you select a key and certificate and press <Certificate Details>, detailed information about the certificate is displayed. You can also press <Verify Certificate> on this screen to check whether the certificate is valid.
To delete keys and certificates, select the ones that you want to delete, and press <Delete>
<Yes>. |