Certificate manager
Important: Even if the use of certificates makes the risks involved in remote connections and software installation
considerably smaller, they must be used correctly in order to benefit from increased security. The existence of a
certificate does not offer any protection by itself; the certificate manager must contain correct, authentic, or trusted
certificates for increased security to be available. Certificates have a restricted lifetime. If "Expired certificate" or
"Certificate not valid yet" is shown even if the certificate should be valid, check that the current date and time in your
device are correct.
Before changing any certificate settings, you must make sure that you really trust the owner of the certificate and that
the certificate really belongs to the listed owner.
Digital certificates are used to verify the origins of software but do not guarantee safety. There are three different types of
certificates: authority certificates, personal certificates, and server certificates. During a secure connection, a server may send a
server certificate to your device. Upon receipt, it is checked through an authority certificate stored on your device. You receive
notification if the identity of the server is not authentic or if you do not have the correct certificate in your device.
Download a certificate from a web site, or receive a certificate as an e-mail attachment, or as a message sent through a Bluetooth
or infrared connection. Certificates should be used when you connect to an online bank or a remote server to transfer confidential
information. They should also be used if you want to reduce the risk of viruses or other malicious software, and to check the
authenticity of software when you download and install software to your device.
Tip: When you add a new certificate, check its authenticity.