Nokia 002P1V9 User Manual - Page 108

Certificate manager, View certificate details, Certificate trust settings

Page 108 highlights

Security and data management Certificate manager Select Menu > Tools > Settings > General > Security > Certificate management. Digital certificates are used to verify the origins of software but do not guarantee safety. There are four different types of certificates: authority certificates, personal certificates, trusted site certificates, and device certificates. During a secure connection, a server may send a server certificate to your device. Upon receipt, it is checked through an authority certificate stored in your device. You receive notification if the identity of the server is not authentic or if you do not have the correct certificate in your device. To view certificate details, open a certificate folder, and select a certificate and Options > Certificate details. One of the following notes may appear: • Certificate not trusted - You have not set any application to use the certificate. You may want to change the trust settings. • Expired certificate - The period of validity has ended for the selected certificate. • Certificate not valid yet - The period of validity has not yet begun for the selected certificate. • Certificate corrupted - The certificate cannot be used. Contact the certificate issuer. Certificate trust settings You can download a certificate from a web site, or receive a certificate as a message. Certificates should be used when you connect to an online bank or a Trusting a certificate means that you authorise it to remote server to transfer confidential information. verify web pages, e-mail servers, software packages, They should also be used if you want to reduce the risk and other data. Only trusted certificates can be used to of viruses or other malicious software, and to check the verify services and software. authenticity of software when you download and install software to your device. Important: Even if the use of certificates makes Tip: When you add a new certificate, check its the risks involved in remote connections and software authenticity. installation considerably smaller, they must be used correctly in order to benefit from increased security. View certificate details The existence of a certificate does not offer any protection by itself; the certificate manager must You can only be sure of the correct identity of a server when the signature and the validity period of a server certificate have been checked. contain correct, authentic, or trusted certificates for increased security to be available. Certificates have a restricted lifetime. If "Expired certificate" or "Certificate not valid yet" is shown, even if the certificate should 108 be valid, check that the current date and time in your device are correct.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148

Certificate manager
Select
Menu
>
Tools
>
Settings
>
General
>
Security
>
Certificate management
.
Digital certificates are used to verify the origins of
software but do not guarantee safety. There are four
different types of certificates: authority certificates,
personal certificates, trusted site certificates, and
device certificates. During a secure connection, a server
may send a server certificate to your device. Upon
receipt, it is checked through an authority certificate
stored in your device. You receive notification if the
identity of the server is not authentic or if you do not
have the correct certificate in your device.
You can download a certificate from a web site, or
receive a certificate as a message. Certificates should
be used when you connect to an online bank or a
remote server to transfer confidential information.
They should also be used if you want to reduce the risk
of viruses or other malicious software, and to check the
authenticity of software when you download and
install software to your device.
Tip:
When you add a new certificate, check its
authenticity.
View certificate details
You can only be sure of the correct identity of a server
when the signature and the validity period of a server
certificate have been checked.
To view certificate details, open a certificate folder, and
select a certificate and
Options
>
Certificate
details
.
One of the following notes may appear:
Certificate not trusted
— You have not set any
application to use the certificate. You may want to
change the trust settings.
Expired certificate
— The period of validity has
ended for the selected certificate.
Certificate not valid yet
— The period of validity
has not yet begun for the selected certificate.
Certificate corrupted
— The certificate cannot be
used. Contact the certificate issuer.
Certificate trust settings
Trusting a certificate means that you authorise it to
verify web pages, e-mail servers, software packages,
and other data. Only trusted certificates can be used to
verify services and software.
Important:
Even if the use of certificates makes
the risks involved in remote connections and software
installation considerably smaller, they must be used
correctly in order to benefit from increased security.
The existence of a certificate does not offer any
protection by itself; the certificate manager must
contain correct, authentic, or trusted certificates for
increased security to be available. Certificates have a
restricted lifetime. If "Expired certificate" or "Certificate
not valid yet" is shown, even if the certificate should
be valid, check that the current date and time in your
device are correct.
108
Security and data management