Nokia E72 Nokia E72 User Guide in US English / Spanish - Page 127

View and edit security modules, Remote configuration, New Java application.

Page 127 highlights

Trusting a certificate means that you authorize it to verify web pages, e-mail servers, software packages and other data. Only trusted certificates can be used to verify services and software. Important: Even if the use of certificates makes the risks involved in remote connections and software installation considerably smaller, they must be used correctly in order to benefit from increased security. The existence of a certificate does not offer any protection by itself; the certificate manager must contain correct, authentic, or trusted certificates for increased security to be available. Certificates have a restricted lifetime. If "Expired certificate" or "Certificate not valid yet" is shown, even if the certificate should be valid, check that the current date and time in your device are correct. Before changing any certificate settings, you must make sure that you really trust the owner of the certificate and that the certificate really belongs to the listed owner. To change the trust settings, select a certificate and Options > Trust settings. Scroll to an application field, and press the scroll key to select Yes or No. You cannot change the trust settings of a personal certificate. Depending on the certificate, a list of applications that can use the certificate is displayed: Symbian installation - New Symbian operating system application. Internet - E-mail and graphics. App. installation - New Java application. Online certif. check - Online certificate status protocol. View and edit security modules Select Menu > Ctrl. panel > Settings and General > Security > Security module. To view or edit a security module, select the module from the list. To view detailed information about a security module, select Options > Security details. To edit the PIN codes for the security module, open the module, and select Module PIN to edit the PIN code for the security module or Signing PIN to edit the PIN code for digital signatures. You may not be able to change these codes for all security modules. The key store contains the contents of the security module. To delete the key store, select Options > Delete. You may not be able to delete the key store of all security modules. Remote configuration Select Menu > Ctrl. panel > Phone > Device mgr.. With Device manager, you can manage settings, data, and software on your device remotely. You can connect to a server, and receive configuration settings for your device. You may receive server profiles and different configuration settings from your service providers or company information management 127 Security and data management

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361

Trusting a certificate means that you authorize it to verify
web pages, e-mail servers, software packages and other
data. Only trusted certificates can be used to verify services
and software.
Important:
Even if the use of certificates makes the risks
involved in remote connections and software installation
considerably smaller, they must be used correctly in order
to benefit from increased security. The existence of a
certificate does not offer any protection by itself; the
certificate manager must contain correct, authentic, or
trusted certificates for increased security to be available.
Certificates have a restricted lifetime. If "Expired
certificate" or "Certificate not valid yet" is shown, even if
the certificate should be valid, check that the current date
and time in your device are correct.
Before changing any certificate settings, you must make
sure that you really trust the owner of the certificate and
that the certificate really belongs to the listed owner.
To change the trust settings, select a certificate and
Options
>
Trust settings
. Scroll to an application field,
and press the scroll key to select
Yes
or
No
. You cannot
change the trust settings of a personal certificate.
Depending on the certificate, a list of applications that can
use the certificate is displayed:
Symbian installation
— New Symbian operating system
application.
Internet
— E-mail and graphics.
App. installation
— New Java application.
Online certif. check
— Online certificate status protocol.
View and edit security modules
Select
Menu
>
Ctrl. panel
>
Settings
and
General
>
Security
>
Security module
.
To view or edit a security module, select the module from
the list.
To view detailed information about a security module,
select
Options
>
Security details
.
To edit the PIN codes for the security module, open the
module, and select
Module PIN
to edit the PIN code for
the security module or
Signing PIN
to edit the PIN code
for digital signatures. You may not be able to change these
codes for all security modules.
The key store contains the contents of the security module.
To delete the key store, select
Options
>
Delete
. You may
not be able to delete the key store of all security modules.
Remote configuration
Select
Menu
>
Ctrl. panel
>
Phone
>
Device mgr.
.
With Device manager, you can manage settings, data, and
software on your device remotely.
You can connect to a server, and receive configuration
settings for your device. You may receive server profiles
and different configuration settings from your service
providers or company information management
127
Security and data management