1.5
Available operations in Administrator mode
To use [E-mail Receive (POP)]
Item
[Protocol]
[Certificate Verification
Settings]
[Device Certificate]
To use [TCP Socket]
Item
[Protocol]
[Device Certificate]
To use [LDAP]
Item
[Protocol]
[Certificate Verification
Settings]
[Device Certificate]
[Applied Functions]
Description
[E-mail Receive (POP)]
To verify the certificate, select items to be verified.
If you select [Enable] at each item, the certificate is verified for each item.
•
[Validity Period]: Check whether or not the certificate is within the validity
period.
[Enable] is specified by default.
•
[CN]: Check whether or not CN (Common Name) of the certificate matches
the server address.
[Disable] is specified by default.
•
[Chain]: Check whether or not there is any problem in the certificate chain
(certificate path). The chain is validated by referencing the external certifi-
cates that are managed on this machine.
[Disable] is specified by default.
•
[Key Usage]: Check whether or not the certificate is used according to the
intended purpose approved by the certificate issuer.
[Disable] is specified by default.
•
[Check CRL Expiration]: Check whether or not the certificate has expired
with CRL (Certificate Revocation List).
[Disable] is specified by default.
•
[Check OCSP Expiration]: Check whether or not the certificate has expired
with the OCSP (Online Certificate Status Protocol) service.
[Disable] is specified by default.
Select the certificate to be used.
Description
[TCP Socket]
Select the certificate to be used.
Description
[LDAP]
To verify the certificate, select items to be verified.
If you select [Enable] at each item, the certificate is verified for each item.
•
[Validity Period]: Check whether or not the certificate is within the validity
period.
[Enable] is specified by default.
•
[CN]: Check whether or not CN (Common Name) of the certificate matches
the server address.
[Disable] is specified by default.
•
[Chain]: Check whether or not there is any problem in the certificate chain
(certificate path). The chain is validated by referencing the external certifi-
cates that are managed on this machine.
[Disable] is specified by default.
•
[Key Usage]: Check whether or not the certificate is used according to the
intended purpose approved by the certificate issuer.
[Disable] is specified by default.
•
[Check CRL Expiration]: Check whether or not the certificate has expired
with CRL (Certificate Revocation List).
[Disable] is specified by default.
•
[Check OCSP Expiration]: Check whether or not the certificate has expired
with the OCSP (Online Certificate Status Protocol) service.
[Disable] is specified by default.
Select the certificate to be used.
1
1-28