The communication methods listed below use a key/certificate or CA certificate. If you want to use a registered key and certificate in actual communication, you need to specify the key and certificate in the settings for each communication method. However, an X.509 DER format CA certificate does not need to be specified in the settings for each communication method. You can use it simply by registering it to the machine. TLS encrypted communication Configuring the Key and Certificate for TLS |
1 | Select the key and certificate that you want to register, and click [Register]. |
2 | Enter the key name and password, and click [OK]. [Key Name] Use alphanumeric characters to enter the name of the key that was registered to the machine. [Password] Use alphanumeric characters to enter the password of the private key that is set for the file to register. |
Managing keys and certificatesYou can check the detailed settings or delete keys and certificates on the screen displayed in step 4. If is displayed, the key is corrupted or invalid. If is displayed, the certificate for the key does not exist. Click a key name to display detailed information about the certificate. You can also click [Verify Certificate] on this screen to check whether the certificate is valid. To delete a key and certificate, select the one that you want to delete, and click [Delete] [OK]. |
Managing CA certificatesYou can check the detailed settings or delete CA certificates on the screen displayed in step 4. Click to display detailed information about the CA certificate. You can also click [Verify Certificate] on this screen to check whether the CA certificate is valid. To delete a CA certificate, select the one that you want to delete, and click [Delete] [OK]. |