Trusted Certificate Allowlist
In order to ensure the security of your devices, it is essential to manage the trusted certificates that are utilized by your applications. By maintaining a list of legitimate certificates, you can ensure that only authorized certificates are automatically trusted, thereby significantly reducing the risks of unauthorized access or data breaches.
Add To Trusted Certificate Allowlist
The Add To Trusted Certificate Allowlist tab consist the following fields:
PROPERTY | DESCRIPTION |
---|---|
|
Add a new certificate to the list of trusted certificates.
|
Move the Trusted Certificate to Remove From Trusted Certificate Allowlist | |
Delete Trusted Certificate |
Remove From Trusted Certificate Allowlist
The Remove To Trusted Certificate Allowlist tab consist the following fields:
PROPERTY | DESCRIPTION |
---|---|
|
Add a new certificate to the list of trusted certificates.
|
Move the Trusted Certificate to Add to Trusted Certificate Allowlist | |
Delete Trusted Certificate |
More information
Support and feedback
Should you encounter any issues using the SecureAge Central with any of the mentioned or missed requirements above, you can always write to us a docs@secureage.com.
This page was last updated: November 08, 2024