
13.3
Configuring certificate verification settings
13
[Web Management Tool]
13-8
13.3
Configuring certificate verification settings
13.3.1
Verifying a certificate for peer
You can configure the settings for verifying reliability of the certificate (expiration date, CN, key usage, etc.).
To check the expiration of certificate, register the URL of the Online Certificate Status Protocol (OCSP) ser-
vice.
In the administrator mode, select [Security] - [Certificate Verification Settings], then configure the following
settings.
13.3.2
Importing external certificates used for validating the chain
Types of external certificates that can be imported
Import external certificates used for validating the certificate chain (certificate path) in this machine.
The following certificates can be imported on this machine.
Settings
Description
[Certificate Verification
Settings]
Select [ON] to verify reliability of the certificate for peer.
[ON] is specified by default.
[Timeout]
Change the time-out time of certificate expiration confirmation if necessary.
[30] sec. is specified by default.
[OCSP Service]
Using the Online Certificate Status Protocol (OCSP) enables you to check online
whether or not the certificate is expired.
Select this check box to use the OCSP service. Enter the URL of the OCSP ser-
vice (using up to 511 characters).
If [URL] is left blank, the URL of the OCSP service embedded in the certificate
will be used.
[Proxy Settings]
To confirm the expiration date via a proxy server, register the proxy server cur-
rently used.
[Proxy
Server
Address]
Enter the address of the proxy server you are using.
Use one of the following formats.
•
Example of host name entry: "host.example.com"
•
Example of IP address (IPv4) entry: "192.168.1.1"
•
Example of IP address (IPv6) entry: "fe80::220:6bff:fe10:2f16"
[Proxy
Server
Port
Number]
If necessary, change the proxy server port number.
[8080] is specified by default.
[User
Name]
Enter the user name to log in to the proxy server (using up to 63 characters).
[Pass-
word]
Enter the password of the user name you entered into [User Name] (using up to
63 characters).
To enter (change) the password, select the [Password is changed.] check box,
then enter a new password.
[Address
not using
Proxy
Server]
If necessary, enter the address that does not use the proxy server.
Use one of the following formats.
•
Example of host name entry: "host.example.com"
•
Example of IP address (IPv4) entry: "192.168.1.1"
•
Example of IP address (IPv6) entry: "fe80::220:6bff:fe10:2f16"
Type
Description
[Trusted CA Root Cer-
tificate]
You must import the certificate of the CA that issued the certificate in question
on this machine in advance, if you wish to validate the chain of a submitted cer-
tificate.
Summary of Contents for D310 Series
Page 12: ...1 Web Connection...
Page 14: ...2 Operations Required to Use Web Connection...
Page 18: ...3 Basic Usage...
Page 40: ...4 ConfiguringBasicInformation Settings of this Machine...
Page 44: ...5 Configuring Network Settings of this Machine...
Page 56: ...6 Setting up the Operating Environment of Web Connection...
Page 61: ...6 4 Changing the time period until automatic log out 6 Web Management Tool 6 6...
Page 62: ...7 Configuring the Scan Environment...
Page 82: ...8 Configuring the Printing Environment...
Page 106: ...9 Configuring the Fax Environment...
Page 120: ...10 Configuring the Network Fax Environment...
Page 132: ...11 Configuring the User Box Environment...
Page 148: ...12 Restricting Users from Using this Device...
Page 199: ...12 22 Using a mobile terminal for authentication purposes 12 Web Management Tool 12 52...
Page 200: ...13 Reinforcing Security...
Page 226: ...14 Managing the Machine Status...
Page 264: ...15 Registering Various Types of Information...
Page 292: ...16 Associating with External Application...
Page 324: ......