HP JetAdvantage Security Manager 10 Device E-LTU Manual do Utilizador Página 21

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 31
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 20
select the desired key length. More selections are available when HP Security Manager is
selected as the CSR source.
15. Certificate Request Signature Algorithm
The primary application of hash functions in cryptography is message integrity. The hash value
provides a digital fingerprint of a message's contents, which ensures that the message has not
been altered by an intruder, virus, or by other means. Use the drop-down menu to select the
desired hash algorithm to include in the CSR. Only SHA (Secure Hash Algorithm) based
selections are available.
16. Renewal Threshold (days)
Use this setting to dictate certificate replacement prior to actual certificate expiration. The default
is 15 days, but should be set to reflect company certificate replacement policy. For testing
purposes, you can set this value to 366 and force a certificate replacement during every
assessment.
CERTIFICATE ASSESSMENT DETAIL
Security Manager handles certificate assessment in two different ways:
during initial assessment and self-signed certificate replacement
during ongoing assessment of the identity certificate that replaced the self-signed certificate
The next section covers both of these methods.
Initial Certificate Assessment
HP printing devices are never without a network certificate. Self-signed certificates are installed by
default on HP devices and are primarily used to provide secure web communication (SSL/TLS).
Because these certificates are not signed by an approved certificate authority within the customer
environment, their identity can’t be trusted. After Security Manager has been configured to access
the approved customer Certificate Authority, it can be used to replace the self-signed certificate with a
CA signed identity certificate.
Once the Identity Certificate setting in the Security Manager policy editor is configured similar to what
is displayed in the image below, you are ready to replace the HP device self-signed certificate with a
CA signed identity certificate. Performing an initial Assess Only will compare the installed device
certificate (self-signed) to what is desired in the Identity Certificate policy editor settings and report on
the assessment recommendations.
Vista de página 20
1 2 ... 16 17 18 19 20 21 22 23 24 25 26 ... 30 31

Comentários a estes Manuais

Sem comentários