gecko-dev/extensions/help/resources/locale/en-US/using_certs_help.xhtml

490 lines
29 KiB
HTML

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<title>Using Certificates</title>
<link rel="stylesheet" href="chrome://help/locale/content_style.css" type="text/css">
</head>
<body bgcolor="white">
<a NAME="certificates:usingIDX"></a>
<a NAME="using_certs_first"></a>
<a NAME="certificates:aboutIDX"></a>
<hr><h1>Using Certificates</h1>
<p>A certificate is the digital equivalent of an ID card. Just as you may have several ID cards for different purposes, such as a driver's license, an employee ID card, or a credit card, you can have several different certificates that identify you for different purposes.</p>
<P>This section describes how to perform operations related to certificates.</p>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
<td class="inthissection">
<p>In this section:</p>
<p><a href="#using_certs_get">Getting Your Own Certificate</a></p>
<p><a href="#using_certs_info">Checking Security for a Web Page</a></p>
<p><a href="#using_certs_manage">Managing Certificates</a></p>
<p><a href="#using_certs_devices">Managing Smart Cards and Other Security Devices</a></p>
<p><a href="#using_certs_ssl">Managing SSL Warnings and Settings</a></p>
<p><a href="#using_certs_validation">Controlling Validation</a></p>
<p><a href="#using_certs_settings">Certificate Settings</a></p>
</td>
</tr>
</table>
<p>&nbsp;</p>
<a NAME="certificates:gettingIDX"></a>
<a NAME="using_certs_get"></a>
<hr><h1>Getting Your Own Certificate</h1>
<P>Much like a credit card or a driver's license, a certificate is a form of identification you can use to identify yourself over the Internet and other networks. Like other commonly used personal IDs, a certificate is typically issued by an organization with recognized authority to issue such identification. An organization that issues certificates is called a <b>certificate authority (CA).</b>
<p>You can obtain certificates that identify you from public CAs, from system administrators or special CAs within your organization, or from web sites offering specialized services that require a means of identification more reliable that your name and password.
<p>Just as the requirements for a driver's license vary depending on the type of vehicle you want to drive, the requirements for obtaining a certificate vary depending on what you want to use it for. In some cases getting a certificate may be as easy as going to a web site, entering some personal information, and automatically downloading the certificate into your browser. In other cases you may have to go through several steps.
<p>You can obtain a certificate today by visiting the URL for a certificate authority and following the on-screen instructions. For a list of certificate authorities, see the online document <a href="https://certs.netscape.com/" TARGET="_blank">Client Certificates</a>. </p>
<p>Once you obtain a certificate, it is automatically stored in a <a href="glossary.html#security_device">security device</a>. Your browser comes with its own built-in software security device. A security device can also be a piece of hardware, such as a smart card.</p>
<p>Like a driver's license or a credit card, a certificate is a valuable form of identification that can be abused if it falls into the wrong hands. Once you've obtained a certificate that identifies you, you should protect it in two ways: by backing it up and by setting your <a href="glossary.html#master_password">master password</a>.
<p>When you first obtain a certificate, you may be prompted to back it up. If you haven't yet created a master password, you will be asked to create one.
<p>For detailed information about backing up a certificate and setting your master password, see <a href="certs_help.html#My_Certificates">Your Certificates</a>.
<p>
[&nbsp;<A HREF="#using_certs_first">Return to beginning of Using Certificates section</A>&nbsp;]
</p>
<p>&nbsp;</p>
<a NAME="security:checking_for_a_web_pageIDX"></a>
<a NAME="using_certs_info"></a>
<hr><h1>Checking Security for a Web Page</h1>
<p>Whenever you're viewing a web page, you can find out details about the security available for that page by opening the View menu, choosing Page Info, and clicking the Security tab.
<p>The Security tab for Page Info provides two kinds of information:
<ul>
<li>The top half of the panel describes whether the web site displaying the page has been correctly identified.
<li>The bottom half describes whether the page you are viewing is encrypted, and if so what grade of encryption it uses.
</ul>
<p>If you're not sure what the displayed information means, see the corresponding message in <a href="ssl_page_info_help.html">SSL Page Info</a>.</p>
<p>
[&nbsp;<A HREF="#using_certs_first">Return to beginning of Using Certificates section</A>&nbsp;]
</p>
<p>&nbsp;</p>
<a NAME="using_certs_manage"></a><a NAME="certificates:managingIDX"></a>
<hr><h1>Managing Certificates</h1>
<p>You can use the Certificate Manager to manage the certificates you have available. Certificates may be stored on your computer's hard disk or on <a href="glossary.html#smart_card">smart cards</a> or other security devices attached to your computer.</p>
<p>To open the Certificate Manager:
<ol>
<li>Open the Edit menu and choose Preferences.
<li>Under the Privacy &amp; Security category, choose Certificates. (If no subcategories are visible, double-click the category to expand the list.)
<li>In the Manage Certificates section, click Manage Certificates. You see the Certificate Manager.
</ol>
<p>&nbsp;
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
<td class="inthissection">
<p>In this section:</p>
<p><a HREF="#using_certs_my">Managing Certificates that Identify You</a></p>
<p><a HREF="#using_certs_sites">Managing Certificates that Identify Web Sites</a></p>
<p><a HREF="#using_certs_cas">Managing Certificates that Identify Certificate Authorities</a></p>
</td>
</tr>
</table>
<p>&nbsp;</p>
<a NAME="using_certs_my"></a><a NAME="certificates:your_ownIDX"></a>
<H2>Managing Certificates that Identify You</H2>
<p>When you first open the Certificate Manager, you'll notice that it has several tabs across the top of its window. The first tab is called Your Certificates, and it displays the certificates your browser has available that identify you. Your certificates are listed under the names of the organizations that issued them.
<p>To perform an action on one or more certificates, click the entry for the certificate (or Control-click to select more than one), then click the View, Backup, or Delete button. Each of these buttons brings up another window that allows you to perform the action. Click the Help button in any window to obtain more information about using that window.
<p>The following buttons under Your Certificates don't require a certificate to be selected. You use them to perform these actions:
<ul>
<li><b>Restore.</b> Click this button if you want to restore a certificate that you've previously backed up or transferred from one machine to another.
<li><b>Backup All.</b> Click this button to back up all your own certificates stored in the <a href="glossary.html#software_security_device">software security device</a>.
</ul>
<p><b>Certificates on smart cards cannot be backed up.</b> Whether you select some of your certificates and click Backup, or click Backup All, the resulting backup file will not include any certificates stored on smart cards or other external security devices. You can only back up certificates that are stored on the internal Software Security Device.
<p>For more details about any of these tasks, click the Help button in any Certificate Manager window or see <a href="certs_help.html#My_Certificates">Your Certificates</a>.
<p>
[&nbsp;<A HREF="#using_certs_first">Return to beginning of Using Certificates section</A>&nbsp;]
</p>
<p>&nbsp;</p>
<a NAME="using_certs_sites"></a><a NAME="certificates:web_siteIDX"></a>
<H2>Managing Certificates that Identify Web Sites</H2>
<p>Some web sites use certificates to identify themselves. Such identification is required before the web site can encrypt information transferred between the site and your computer (or vice versa), so that nobody can read the data while in transit.
<p>If the URL for a web site begins with <tt>https://</tt>, the web site has a certificate. If you visit such a web site and its certificate was issued by a CA that the Certificate Manager doesn't know about or doesn't trust, you will be asked whether you want to accept the web site's certificate. When you accept a new web site certificate, the Certificate Manager adds it to its list of web site certificates.
<p>To view all the web site certificates available to your browser, click the Web Sites tab at the top of the Certificate Manager window.
<p>To perform an action on one or more web site certificates, click the entry for the certificate (or Shift-click to select more than one), then click the View, Edit, or Delete button. Each of these buttons brings up another window that allows you to perform the corresponding action.
<p>The Edit button allows you to specify whether your browser will trust the selected web site certificates in the future.
<p>For more details, click the Help button in any Certificate Manager window or see <a href="certs_help.html#Web_Site_Certificates">Web Site Certificates</a>.
<p>
[&nbsp;<A HREF="#using_certs_first">Return to beginning of Using Certificates section</A>&nbsp;]
</p>
<p>&nbsp;</p>
<a NAME="using_certs_cas"></a><a NAME="certificates:certificate_authorityIDX"></a>
<H2>Managing Certificates that Identify Certificate Authorities</H2>
<p>Like other commonly used forms of ID, a certificate is issued by an organization with recognized authority to issue such identification. An organization that issues certificates is called a <a href="glossary.html#certificate_authority_(CA)">certificate authority (CA)</a>. A certificate that identifies a CA is called a CA certificate.
<p> Certificate Manager typically has many CA certificates on file. These CA certificates permit Certificate Manager to recognize and work with certificates issued by the corresponding CAs. However, the presence of a CA certificate in this list does <i>not</i> guarantee that the certificates it issues can be trusted. You or your system administrator must make decisions about what kinds of certificates to trust depending on your security needs.
<p>To view all the CA certificates available to your browser, click the Authorities tab at the top of the Certificate Manager window.
<p>To perform an action on one or more CA certificates, click the entry for the certificate (or Control-click to select more than one), then click the View, Edit, or Delete button. Each of these buttons brings up another window that allows you to perform the action. Click the Help button in any window to obtain more information about using that window.
<p>The Edit button allows you to view and control the trust settings for each certificate. Trust settings for a CA certificate let you to specify which kinds of certificates issued by that CA you are willing to trust.
<p>For more details, click the Help button in any Certificate Manager window or see <a href="certs_help.html#CA_Certificates">Authorities</a>.
<p>
[&nbsp;<A HREF="#using_certs_first">Return to beginning of Using Certificates section</A>&nbsp;]
</p>
<p>&nbsp;</p>
<a NAME="using_certs_devices"></a>
<a NAME="smart_cardsIDX"></a>
<a NAME="Device_Manager:usingIDX"></a>
<a NAME="security_devices:managingIDX"></a>
<a NAME="security_modules:managingIDX"></a>
<hr><h1>Managing Smart Cards and Other Security Devices</h1>
<p>A smart card is a small device, typically about the size of a credit card, that contains a microprocessor and is capable of storing information about your identity (such as your <a href="glossary.html#private_key">private keys</a> and <a href="glossary.html#certificate">certificates</a>) and performing cryptographic operations.
<p>To use a smart card, you typically need to have a smart card reader (a piece of hardware) attached to your computer, as well as software on your computer that controls the reader.
<p>A smart card is just one kind of security device. A security device (sometimes called a token) is a hardware or software device that provides cryptographic services and stores information about your identity. Use the Device Manager to work with smart cards and other security devices.
</p>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
<td class="inthissection">
<p>In this section:</p>
<p><a href="#using_certs_devices_about">About Security Devices and Modules</a></p>
<p><a href="#using_certs_devices_devices">Work with Security Devices</a></p>
<p><a href="#using_certs_devices_modules">Work with Security Modules</a></p>
<p><a href="#using_certs_devices_fips">Enable FIPS Mode</a></p>
</td>
</tr>
</table>
<p>&nbsp;</p>
<a NAME="using_certs_devices_about"></a><a NAME="security_modules:aboutIDX"></a>
<a NAME="Device_Manager:aboutIDX"></a>
<a NAME="security_devices:aboutIDX"></a>
<h2>About Security Devices and Modules</h2>
<p>The Device Manager displays a window that lists the available security devices. You can use the Device Manager to manage any security devices, including smart cards, that support the Public Key Cryptography Standard (PKCS) #11.
<p>A <a href="glossary.html#PKCS_11_module">PKCS #11 module</a> (sometimes called a security module) controls one or more security devices in much the same way that a software driver controls an external device such as a printer or modem. If you are installing a smart card, you must install the PKCS #11 module for the smart card on your computer as well as connecting the smart card reader.
<p>By default, the Device Manager controls two internal PKCS #11 modules that manage three security devices:
<ul>
<li><b>Builtin Roots Module</b> controls a special security device called the Builtin Object Token. This token stores the default <a href="glossary.html#CA_certificate">CA certificates</a> that come with the browser.
<li><b>Netscape Internal PKCS #11 Module</b> controls two security devices:
<ul>
<li><b>Generic Crypto Services</b> is a special security device that performs all cryptographic operations required by the Netscape Internal PKCS #11 Module.
<li><b>Software Security Device</b> stores your certificates and keys that aren't stored on external security devices, including any CA certificates that you may have installed in addition to those that come with the browser.
</ul>
</ul>
<p>
[&nbsp;<A HREF="#using_certs_first">Return to beginning of Using Certificates section</A>&nbsp;]
</p>
<p>&nbsp;</p>
<a NAME="using_certs_devices_devices"></a>
<h2>Using Security Devices</h2>
<p>This section assumes you are looking at the Device Manager:
<ol>
<li>Open the Edit menu and choose Preferences.
<li>Under the Privacy &amp; Security category, choose Certificates. (If no subcategories are visible, double-click the category to expand the list.)
<li>In the Certificates panel, click Manage Devices.
</ol>
<p>The Device Manager lists each available PKCS #11 module in boldface, and the security devices managed by each module below its name.
<p>When you select a security device, information about it appears in the middle of the Device Manager window, and some of the buttons on the right side of the window become available. For example, if you select the Software Security Device, you can perform these actions:
<ul>
<li>Click Login or Logout to log in or out of the Software Security Device. If you are logging in, you will be asked to supply the master password for the device. You must be logged into a security device before your browser software can use it to provide cryptographic services.
<li>Click Change Password to change the master password for the device.
</ul>
<p>You can perform these actions on most security devices. However, you cannot perform them on Builtin Object Token or Generic Crypto Services, which are special devices that must normally be available at all times.
<p>
[&nbsp;<A HREF="#using_certs_first">Return to beginning of Using Certificates section</A>&nbsp;]
</p>
<p>&nbsp;</p>
<a NAME="using_certs_devices_modules"></a>
<h2>Using Security Modules</h2>
<p>If you want to use a smart card or other external security device, you must first install the module software on your computer and if necessary connect any associated hardware. Follow the instructions that come with the hardware.
<p>After a new module is installed on your computer, follow these steps to load it:
<ol>
<li>Open the Edit menu and choose Preferences.
<li>Under the Privacy &amp; Security category, choose Certificates. (If no subcategories are visible, double-click the category to expand the list.)
<li>In the Certificates panel, click Manage Devices.
<li>Click Load.
<li>In the Load PKCS #11 Module dialog box, click the Browse button, locate the module file, and click Open.
<li>Fill in the Module Name field with the name of the module and click OK.
</ol>
<p>The new module will then show up in the list of modules with the name you assigned to it.
<p>To unload a PKCS #11 module, select its name and click Unload.
<p>&nbsp;</p>
<a NAME="using_certs_devices_fips"></a><a NAME="FIPS_modeIDX"></a>
<h2>Enable FIPS Mode</h2>
<p>Federal Information Processing Standards Publications (FIPS PUBS) 140-1 is a US government standard for implementations of cryptographic modules&mdash;that is, hardware or software that encrypts and decrypts data or performs other cryptographic operations (such as creating or verifying digital signatures). Many products sold to the US government must comply with one or more of the FIPS standards.
<p>To enable FIPS mode for the browser, you use the Device Manager:
<ol>
<li>Open the Edit menu and choose Preferences.
<li>Under the Privacy &amp; Security category, choose Certificates. (If no subcategories are visible, double-click the category to expand the list.)
<li>In the Certificates panel, click Manage Devices.
<li>Click the Enable FIPS button. When FIPS is enabled, the name NSS Internal PKCS #11 Module changes to NSS Internal FIPS PKCS #11 Module and the Enable FIPS button changes to Disable FIPS.
</ol>
<p>To disable FIPS-mode, click Disable FIPS.</P>
<p>
[&nbsp;<A HREF="#using_certs_first">Return to beginning of Using Certificates section</A>&nbsp;]
</p>
<p>&nbsp;</p>
<a NAME="using_certs_ssl"></a>
<hr><h1>Managing SSL Warnings and Settings</h1>
<p>The Secure Sockets Layer (SSL) protocol allows your computer to exchange information with other computers on the Internet in encrypted form&mdash;that is, the information is scrambled while in transit so that no one else can make sense of it. SSL is also used to identify computers on the Internet by means of <a href="glossary.html#certificate">certificates</a>.
<p>The Transport Layer Security (TLS) protocol is a new standard based on SSL. By default, the browser supports both SSL and TLS. This approach works for most people, because it guarantees that the browser will work with virtually all other existing software on the Internet that supports any version of SSL or TLS.
<p>However, in some circumstances system administrators or other knowledgeable persons may wish to adjust the SSL settings to fine-tune them for special security needs or to account for bugs in some older software products.
<p>You shouldn't adjust the SSL settings for your browser unless you know what you're doing or have the assistance of someone else who does. If you do need to adjust them for some reason, follow these steps:
<ol>
<li>Open the Edit menu and choose Preferences.
<li>Under the Privacy &amp; Security category, select SSL. (If no subcategories are visible, double-click the category to expand the list.)
</ol>
<p>For more details, click the Help button in the SSL Settings panel or see <a href="ssl_help.html">SSL Settings</a>.
</p>
<p>
[&nbsp;<A HREF="#using_certs_first">Return to beginning of Using Certificates section</A>&nbsp;]
</p>
<p>&nbsp;</p>
<a NAME="using_certs_validation"></a>
<a NAME="certificates:validationIDX"></a>
<a NAME="validation,_of_certificates:aboutIDX"></a>
<hr><h1>Controlling Validation</h1>
<p>As discussed above under <a href="#using_certs_get">Get Your Own Certificate</a>, a certificate is a form of identification, much like a driver's license, that you can use to identify yourself over the Internet and other networks. However, also like a driver's license, a certificate may be expired or invalid for some other reason. Therefore, your browser software needs to confirm the validity of any given certificate in some way before trusting it for identification purposes.
<p>This section describes how Certificate Manager validates certificates and how to control that process. To understand the process, you should have some familiarity with <a href="glossary.html#public-key_cryptography">public-key_cryptography</a>. If you are not familiar with the use of certificates, you should check with your system administrator before attempting to change any of your browser's certificate validation settings.<p>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
<td class="inthissection">
<p>In this section:</p>
<p><a href="#How_Certificate_Validation_Works">How Validation Works</a></p>
<p><a href="#Managing_CRLs">Managing CRLs</a></p>
<p><a href="#Configuring_Certificate_Manager_for_OCSP">Configuring OCSP</a></p>
<p><a href="validation_help.html">Validation Settings</a></p>
</td>
</tr>
</table>
<p>
<p>&nbsp;</p>
<a name="How_Certificate_Validation_Works">
<a NAME="OCSP:aboutIDX"></a>
<a NAME="CRLs:aboutIDX"></a>
<a NAME="validation_of_certificates:aboutIDX"></a>
<h2>How Validation Works</h2></a>
<p>Whenever you use or view a certificate stored by Certificate Manager, it takes several steps to verify the certificate. At a minimum, it confirms that the CA's digital signature on the certificate was created by a CA whose own certificate is (1) present in the Certificate Manager's list of available CA certificates and (2) marked as trusted for issuing the kind of certificate being verified.
<p>If the CA certificate is not itself present, the <a href="glossary.html#certificate_chain">certificate chain</a> for the CA certificate must include a higher-level CA certificate that is present and correctly trusted. Certificate Manager also confirms that the certificate being verified is currently marked as trusted in the certificate store. If any one of these checks fails, Certificate Manager marks the certificate as unverified and won't recognize the identity it certifies.
<p>A certificate can pass all these tests and still be compromised in some way; for example, the certificate be revoked because an unauthorized person has gained access to the certificate's private key. A compromised certificate can allow an unauthorized person (or web site) to pretend to be the certificate owner.
<p>One way to combat this threat is for Certificate Manager to check a certificate revocation list (CRL) as part of the verification process (see <a href="#Managing_CRLs">Managing CRLs</a>, below). Typically, you download a CRL to your browser by clicking a link. If a CRL is present, Certificate Manager checks any certificate issued by the same CA against the list as part of the verification process.
<p>The reliability of CRLs is subject to the frequency with which they are both updated by a server and checked by a client. You can configure your <a href="validation_help.html#auto_crl_update_prefs">Automatic CRL Update Preferences</a> so that a CRL will be updated automatically at regular intervals with the version currently on the server.
<p>Another way to combat the threat of compromised certificates is to use a special server that supports the Online Certificate Status Protocol (OCSP). Such a server can answer client queries about individual certificates (see <a href="#Configuring_Certificate_Manager_for_OCSP">Configuring OCSP</a>, below).
<p>The server, called an OCSP responder, receives an updated CRL periodically from the CA that issues the certificates to be verified. You can configure Certificate Manager to submit a status request for a certificate to the OCSP responder, and the OCSP responder confirms whether the certificate is valid.
<p>&nbsp;</p>
<a name="Managing_CRLs"><h2>Managing CRLs</h2></a>
<p>A certificate revocation list (CRL) is list of revoked certificates. A <a href="glossary.html#certificate_authority (CA)">certificate authority (CA)</a> might revoke a certificate, for example, if it has been compromised in some way&mdash;much the way a credit card company might revoke your credit card if you report that it's been stolen.
</p>
<p>This section describes how to import and manage CRLs. <p>For background information, see <a href="#How_Certificate_Validation_Works">How Validation Works</a>.
<p>For detailed descriptions of CRL settings that you can control, see <a href="#validation_settings">Validation Settings</a>.</p>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
<td class="inthissection">
<p>In this section:</p>
<p><a href="#next_update">About the "Next Update" Date</a></p>
<p><a href="#Importing_CRLs">Importing CRLs</a></p>
<p><a href="#view_manage_CRLs">Viewing and Managing CRLs</a></p>
</td>
</tr>
</table>
<p>&nbsp;</p>
<a name ="next_update"></a><h3>About the "Next Update" Date</h3>
<p>The browser uses the CRLs it has available to check the validity of certificates issued by the corresponding CAs. If a certificate is listed as revoked, the browser won't accept it as evidence of identity.
<p>A CA typically publishes an updated CRL at regular intervals. Every CRL includes a date, specified in the Next Update field, by which the CA will publish the next update of that CRL. In general, if the date in the Next Update field is earlier than the current date, you should obtain the most recent version of the CRL. To view CRL information and set up automatic CRL updating, see <a href="#view_manage_CRLs">Viewing and Managing CRLs</a>.
<p>Although the absence of the most recent CRL does not by itself invalidate a certificate, the browser may not handle such certificates correctly. In some situations, you may want to delete CRLs with Next Update dates earlier than the present. Speak to your system administrator for guidance on CRL management.
<p>&nbsp;</p>
<a name="Importing_CRLs"></a><h3>Importing CRLs</h3>
<p> You can import the latest CRL from a CA into your browser. To import a CRL, follow these steps:
<ol>
<li>Go to the URL specified by the CA or by your system administrator and click the link for the CRL that you want to import.
<p>The Import Status dialog box appears.
<li>Confirm that the CRL was imported successfully and that it's the one you wanted. In most cases you should also click Yes, which enables automatic updating of the CRL you just imported.
<li>The next step depends on whether you click Yes or No in the Import Status dialog box:
<ul>
<p><b>Yes:</b> The Automatic CRL Update Preferences dialog box appears. In this case, go on to step 4.
<p><b>No:</b> The Import Status dialog box closes. If you change your mind and decide to enable automatic updates after all, see <a href="#view_manage_CRLs">Viewing and Managing CRLs</a>.</p>
</ul>
<li>Select the option labeled &quot;Enable Automatic Update for this CRL&quot;.
<li>Decide how you want to schedule the automatic updates:</li>
<ul>
<li><b>Update X days before Next Update date.</b> Select this option if you want to base the update frequency on the frequency with which the CRL publisher publishes a new version of the CRL.
<li><b>Update every X days.</b> Select this option if you want to specify an update interval unrelated to the CRL's Next Update date.
</ul>
<li>Click OK to confirm your choices.
</ol>
<p>&nbsp;</p>
<a name="view_manage_CRLs"></a><h3>Viewing and Managing CRLs</h3>
<p>You can view and manage CRLs available to the browser through the browser's Validation preferences:
<ol>
<li>Open the Edit menu and choose Preferences.
<li>Under the Privacy &amp; Security category, choose Validation. (If no subcategories are visible, double-click the category to expand the list.)
<li>Click Manage CRLs in the Validation panel to see a list of the CRLs available to Certificate Manager.
</ol>
<p>To delete or update a CRL, select it and click the appropriate button.
<p>To set up automatic updates for a CRL, select the CRL and click Settings. The Automatic CRL Update Preferences dialog box appears:
<ol>
<li>Select the option labeled &quot;Enable Automatic Update for this CRL&quot;.
<li>Decide how you want to schedule the automatic updates:</li>
<ul>
<li><b>Update X days before Next Update date.</b> Select this option if you want to base the update frequency on the frequency with which the CRL publisher publishes a new version of the CRL.
<li><b>Update every X days.</b> Select this option if you want to specify an update interval unrelated to the CRL's Next Update date.
</ul>
<li>Click OK to confirm your choices.
</ol>
<p>&nbsp;</p>
<a name="Configuring_Certificate_Manager_for_OCSP"><h2>Configuring OCSP</h2></a>
<p>The settings that control OCSP are part of Validation preferences. To view Validation preferences, follow these steps:
<ol>
<li>Open the Edit menu and choose Preferences.
<li>Under the Privacy &amp; Security category, choose Validation. (If no subcategories are visible, double-click the category to expand the list.)
</ol>
<p>For information about the OCSP options available, see <a href="validation_help.html#OCSP">OCSP</a>.
<p>
[&nbsp;<A HREF="#using_certs_first">Return to beginning of Using Certificates section</A>&nbsp;]
</p>
<hr>
<p><i>25 January 2002</i></p>
<p>Copyright &copy; 1998-2002 The Mozilla Organization.</p>
</body>
</html>