Pki settings] - [protocol settings, Pki settings] - [protocol settings] -24 – Konica Minolta bizhub 4750 User Manual

Page 30

Advertising
background image

[Applied Functions]

1-24

1.5

Available operations in Administrator mode

1

[PKI Settings] - [Protocol Settings]

To display: Administrator mode - [Security] - [PKI Settings] - [Protocol Settings]

This machine can manage multiple certificates and use different certificates depending on the application
(protocol). Select a certificate that is used for the protocol.

To use [IEEE802.1X]

To use [S/MIME]

To use [HTTP Server]

[Encryption Strength]

Select the SSL encryption strength. Select the appropriate strength to suit your
environment.
[AES-256, 3DES, RC4-128] is specified by default.

[SSL/TLS Version]

Select the version of the SSL to be used. Select the appropriate version to suit
your environment.

Item

Description

Item

Description

[Protocol]

[IEEE802.1X]

[Certificate Verification
Settings]

To verify the certificate, select items to be verified.
If you select [Enable] at each item, the certificate is verified for each item.

[Validity Period]: Check whether or not the certificate is within the validity
period.
[Enable] is specified by default.

[CN]: Check whether or not CN (Common Name) of the certificate matches
the server address.
[Disable] is specified by default.

[Chain]: Check whether or not there is any problem in the certificate chain
(certificate path). The chain is validated by referencing the external certifi-
cates that are managed on this machine.
[Disable] is specified by default.

[Device Certificate]

Select the certificate to be used.

Item

Description

[Protocol]

[S/MIME]

[Certificate Verification
Settings]

To verify the certificate, select items to be verified.
If you select [Enable] at each item, the certificate is verified for each item.

[Validity Period]: Check whether or not the certificate is within the validity
period.
[Enable] is specified by default.

[Chain]: Check whether or not there is any problem in the certificate chain
(certificate path). The chain is validated by referencing the external certifi-
cates that are managed on this machine.
[Disable] is specified by default.

[Key Usage]: Check whether or not the certificate is used according to the
intended purpose approved by the certificate issuer.
[Disable] is specified by default.

[Check CRL Expiration]: Check whether or not the certificate has expired
with CRL (Certificate Revocation List).
[Disable] is specified by default.

[Check OCSP Expiration]: Check whether or not the certificate has expired
with the OCSP (Online Certificate Status Protocol) service.
[Disable] is specified by default.

[Device Certificate]

Select the certificate to be used.

Item

Description

[Protocol]

[HTTP Server]

[Device Certificate]

Select the certificate to be used.

Advertising
This manual is related to the following products: