Loading

Certificates overview

Introduction

There are two kinds of certificates:

  • Trusted certificates

  • Identity certificates

Trusted certificates

Trusted certificates allow the controller to recognize Root and intermediate certificates that may be sent by :

  • The mail server, with secure communication via HTTPS, when configuring or using it for System administrator password recovery.

  • The proxy server, during communication with the back office, when Remote Service communication is enabled.

Identity certificates

Identity certificates are required to allow a browser to establish a HTTPS connection with the controller for access to the settings editor.

Actions

You can:

  • Import trusted certificates used by your company. Ask the IT administrator. For more information, see Import a trusted certificate

  • Enable the use of a HTTPS protocol, by requesting and uploading a certificate. For more information, see Enable the use of HTTPS