Nokia RAE-3N Cell Phone User Manual


 
Copyright © 2004 Nokia. All rights reserved.
Extras
164
Note however, that even if the use of certificates makes the risks involved in remote
connections and software installation considerably smaller, they must be used
correctly in order to benefit from increased security. The existence of a certificate
does not offer any protection by itself; Certificate manager must contain correct,
authentic, and trusted certificates for increased security to be available.
To open the main view of Certificate manager, press the Extras application button,
select Control panel, and select Certificate manager.
The main view lists the currently available certificates and their validity
information.
Note: Certificates have a restricted lifetime. If a certificate is marked Expired
even if it should be Valid, check that the date and time in your
communicator are correct.
To define the usage of the certificate
1 Select the certificate and press View details. A dialog with certificate details
opens.
2 Press Trust settings. A dialog opens.
3 If you want this certificate to be able to certify WWW sites and mail servers,
select Web browser and Mail, press Change, and select Yes
4 If you want this certificate to be able to certify the origin of a new software,
select Software installation, press Change, and select Yes.
Note: Before changing these settings, you must make sure that you really trust
the owner of the certificate and that the certificate really belongs to the
listed owner.
To check that a certificate is authentic
Certificates are used to verify the origin of WWW pages and installed software.
However, they can only be trusted if the origin of the certificate is known to be
authentic. If you are adding a new certificate, or want to check the authenticity of
an existing certificate, proceed as follows:
1 Select the certificate and press View details. A view of certificate details opens.
2 The Subject: field identifies the owner of this certificate. Make sure that this is
the name of the party to whom you think that this certificate belongs.
3 Scroll the dialog until you see the Fingerprint: field.
4 The Fingerprint: field uniquely identifies the certificate. Contact the help desk or
customer service of the owner of the certificate (see step 2 above) and ask for
the MD5 fingerprint of the certificate. Compare the fingerprint with the one
shown in the dialog. If they match, the certificate is authentic.
Note: Use this authentication procedure each time you add a new certificate.
LindaDeepak_ri.fm Page 164 Monday, September 27, 2004 2:34 PM