Skip header
ManualsContentsPreviousNextHelp

SSL (Secure Sockets Layer) Encryption

This can be specified by the administrator.

To protect the communication path and establish encrypted communication, create and install the device certificate.

There are two ways of installing a device certificate: create and install a self-signed certificate using the machine, or request a certificate from a certificate authority and install it.

SSL (Secure Sockets Layer)

Illustration of SSL

  1. To access the machine from a user's computer, request the SSL device certificate and public key.

  2. The device certificate and public key are sent from the machine to the user's computer.

  3. Create a shared key from the user's computer, and then encrypt it using the public key.

  4. The encrypted shared key is sent to the machine.

  5. The encrypted shared key is decrypted in the machine using the private key.

  6. Transmit the encrypted data using the shared key, and the data is then decrypted at the machine to attain secure transmission.

Configuration flow (self-signed certificate)

  1. Creating and installing the device certificate

    Install the device certificate using Web Image Monitor.

  2. Enabling SSL

    Enable the "SSL/TLS" setting using Web Image Monitor.

Configuration flow (certificate issued by a certificate authority)

  1. Creating the device certificate

    Create the device certificate using Web Image Monitor.

    The application procedure after creating the certificate depends on the certificate authority. Follow the procedure specified by the certificate authority.

  2. Installing the device certificate

    Install the device certificate using Web Image Monitor.

  3. Enabling SSL

    Enable the "SSL/TLS" setting using Web Image Monitor.

Note

Related topics

Creating and Installing the Self-Signed Certificate
Creating the Device Certificate (Certificate Issued by a Certificate Authority)
Installing the Device Certificate (Certificate Issued by a Certificate Authority)
Enabling SSL