Displays security information and configures various settings for this system.
The following setting is required to display this screen.
Screen access
Web Connection - [Security]
Setting item | Description |
---|---|
Configure various settings related to the certificate. | |
Configure the setting to verify the certificate. | |
Set the time required to automatically log out when no operation is performed for the specified time after login to Web Connection. | |
Change the administrator password. |
Registering the certificate in this system allows you to encrypt communications between this system and the computer using SSL.
This system manages multiple certificates, enabling you to use them depending on protocols.
A: Prohibits spoofing.
B: Prohibits tampering.
C: Prohibits interception.
Create a new self-signed certificate, or install the certificate issued from the certificate authority (CA).
The table below shows the methods to use the certificate in this system.
Usage | Description |
---|---|
Using the self-signed certificate | Create a certificate on this system. This method does not require the CA, so you can only enter the information required to create a certificate, and use the certificate. However, the security level is lower than the certificate issued from the CA. |
Using the certificate issued from the CA | Create certificate signing request data on this system, and request the trusted CA to issue the certificate of this system. After the examination by the CA, data is returned, so register the data in this system. |