There are two kinds of certificates:
Trusted certificates
Identity certificates
Trusted certificates allow the controller to recognize Root and intermediate certificates that may be sent by :
The mail server, with secure communication via HTTPS, when configuring or using it for System administrator password recovery.
The proxy server, during communication with the back office, when Remote Service communication is enabled.
Identity certificates are required to allow a browser to establish a HTTPS connection with the controller for access to the settings editor.
You can:
Import trusted certificates used by your company. Ask the IT administrator. For more information, see Import a trusted certificate
Enable the use of a HTTPS protocol, by requesting and uploading a certificate. For more information, see Enable the use of HTTPS