Configuring the Browser Settings
Precautions for Using the Browser Function
Communication between the machine and the server via a web browser is exposed to eavesdropping
and data tampering. Because of this, it is recommended to install the site certificates issued for the
websites the machine is allowed to browse and enable the machine's Site Certificate Check function in
advance. Access to unauthorized can be prevented by allowing the machine to access only the websites
whose certificates are installed on the machine.
It is recommended to enable [Site Certificate Check] especially when you send data using Extended
JavaScript.
To enable [Site Certificate Check], it is necessary to enable the machine's SSL function and install site
certificates.
For details about configuring SSL, see page 86 "Configuring SSL/TLS Settings".
For details about installing site certificates, see page 108 "Configuring IEEE 802.1X Authentication".
The machine's Site Certificate Check settings can be specified only via Web Image Monitor.
See the related articles in the Web Image Monitor Help.
If [Site Certificate Check] is disabled and the user accesses an untrusted Web site, a warning message
may appear.
If this is the case, the connected website may have security problems. In such a case, the machine
administrator must refer to page 149 "Troubleshooting", and then instruct the users to take appropriate
measures accordingly.
Further, even if such a message does not appear, to minimize the risk of information leakage and data
tampering, the administrator should instruct users to check the certificates and URLs of the connected
websites so that access to unauthorized Web sites can be prevented.
Untrusted Web site
An "untrusted website" is as follows:
• It does not issue any certificate.
• An unknown source issues the site's certificate.
• The site's certificate has expired.
Troubleshooting
If the connected website has a security problem, a message may appear.
If this is the case, the machine administrator must check the message and instruct the users to take
appropriate measures accordingly.
Configuring the Browser Settings
149
Содержание PRO C9100
Страница 2: ......
Страница 8: ...List of Operation Privileges for Address Books 229 INDEX 231 6...
Страница 24: ...1 Getting Started 22...
Страница 72: ...4 Preventing Leakage of Information from Machines 70...
Страница 116: ...5 Enhanced Network Security 114...
Страница 176: ...6 Managing the Machine 174...
Страница 188: ...7 Troubleshooting 186...
Страница 218: ...System Log Settings User Mach N W File Unset Set System Log R R R R R 8 List of Operation Privileges for Settings 216...
Страница 220: ...Settings User Mach N W File Unset Set Device Access Violation R W 8 List of Operation Privileges for Settings 218...
Страница 235: ......
Страница 236: ...EN GB EN US EN AU M238 1022 2014...