Configuring Certificates

Certificates

Certificates are the digital equivalent of identity cards. They are used to encrypt and decrypt information transferred between sites. Certificates are configured on the Advanced panel under At the top of the Thunderbird window, click the Tools menu and select Options...In the menu bar, click the Thunderbird menu and select Preferences...At the top of the Thunderbird window, click the Edit menu and select Preferences . The following options are available:

  • When a server requests my personal certificate: Some servers ask you to identify yourself with a personal certificate. In order to do so, they ask Thunderbird to generate one for you. When you visit the site in the future, Thunderbird will ask you for which certificate to use. If you wish to have Thunderbird automatically choose a certificate, select the Select one automatically optionpreference.
    Note: A personal certificate can contain personal identity information, such as your name or address. It may therefore compromise your privacy if you select the Select one automatically optionpreference, because you will not be alerted when a website requests your personal certificate. Therefore, you may lose the ability to control who can access your personal information.
  • View Certificates: Click this button to load the Certificate Manager, where you can view stored certificates, import new certificates, and back up or delete old certificates.
  • Revocation Lists: Thunderbird can use Certificate Revocation Lists (also known as CRLs) to ensure that your certificates are valid. Click the Revocation Lists button to manage the CRLs installed on your computer.
  • Validation: Thunderbird may ask an Online Certificate Status Protocol (OCSP) server to confirm that a certificate is still valid. By default, Thunderbird validates a certificate if the certificate provides an OCSP server. Alternatively, you can choose an OCSP server against which to validate all certificates. Click the Validation button to manage these optionspreferences.
  • Security Devices: Security devices can be used to encrypt and decrypt connections and store certificates and passwords. If you need to use a security device, click the Security Devices button.



Share this article: http://mzl.la/1cCbtd2

Was this article helpful? Please wait...

These fine people helped write this article: MattAuSupport, dyvik1001. You can help too - find out how.