User manual
Security
myUTN User Manual Mac 89
6.6 How to Use Certificates Correctly
The UTN server has its own certificate management. This section
explains how certificates are used and when the use of certificates is
recommended.
What are
Certificates?
Certificates can be used in TCP/IP-based networks to encrypt data
and to authenticate communication partners. Certificates are elec-
tronic messages containing a key (public key) and a signature.
Benefits and
Purpose
The use of certificates allows for various security mechanisms. Use
certificates in your UTN server
• to check the identity of the UTN server in the network; see:
’Configuring EAP-TLS’ 98.
• to authenticate the UTN server if the email communication is
protected (POP3/SMTP via SSL/TLS) 41.
• to authenticate the UTN server/client if the data transfer
between the clients and the UTN server is encrypted via SSL/TLS
104.
• to authenticate the UTN server/client if the administrative access
to the myUTN Control Center is protected via HTTPS (SSL/TLS).
If you use certificates, it is advisable to protect the administrative
access to the myUTN Control Center by a password so that the cer-
tificate on the UTN server cannot be deleted by unauthorized per-
sons; see: 83.
Which Certificates
are Available?
Both self-signed and externally signed certificates can be used with
the UTN server. The following certificates can be distinguished:
• Upon delivery, a self-signed certificate (the so-called default
certificate) is stored in the UTN server. It is recommended that
you replace the default certificate by a self-signed certificate or
requested certificate as soon as possible.
• Self-signed certificates have a digital signature that has been
created by the UTN server.