Managing Lists of Certificate Authorities

The appliance uses stored trusted certificate authorities to verify a certificate from a remote domain to establish the credentials of the domain. You can configure the security management appliance to use the following trusted certificate authorities:

  • System list- The appliance has a pre-installed list of trusted certificate authorities. This is called the system list.

  • Custom list- You can customize a list of trusted certificate authorities, and then import the custom list into the appliance.

Note
You can use either the system list or the customized list, or both to verify certificate from a remote domain.

Manage the lists using the Network > Certificates > Edit Certificate Authorities page in the GUI or the certconfig > certauthority command in the CLI.

On the Network > Certificates > Edit Certificate Authorities page, you can perform the following tasks:

On the Network > Certificates > Manage Trusted Root Certificates page, you can perform the following tasks: