Ha tájékozódni szeretne arról, hogy az Epson miként használja fel a személyes adatait, akkor kérjük, olvassa el az adatvédelmi tájékoztató nyilatkozatot.
Az alábbiakban adja meg elérhet?ségeit, és az Epson szakért?je kapcsolatba fog lépni Önnel:
This document details a simple process to create and upload a certificate to the following products/interfaces:
This guide was produced using a TM-m30 printer with Google Chrome 55 running on Ubuntu Linux 16.04 LTS.
The listed TM-Printers require all cryptography objects to be bundled as a single archive file. This is achieved using the “PKCS #12” archive file format to collect the multiple data files together.
This guide presents a simple repackaging of the private key and certificate into the required archive format.
In recent years, the creators of web browsers have worked to make their offerings more secure. In regard to HTTPS, the goal was not only to make the requirements more stringent but also to make users less likely to simply ‘click through’ errors, making themselves more vulnerable to security problems. Often, it may be necessary to upload customised cryptography objects to the printer to ensure not only security, but also compatibility with modern browsers
The following procedure is an example of a PKCS #12 archive creation, upload and select. This can be especially useful for complex scenarios, such as where certificates are signed as part of a trust chain: the entire chain can be included within the archive.
This is not a guide to OpenSSL and the systems integrator should make appropriate security arrangements of their own.
The below steps will generate keys and certificates, package them in a PKCS#12 archive, upload them to the printer and select them in WebConfig.
The following line generates a key and a signed certificate, packaged in an output .pem file which contains both key and certificate.
openssl req -x509 -nodes -days 365 -newkey rsa:1024 -keyout mycert.pem -out mycert.pem
The command will interactively prompt the user for input. Pay particular attention to the CommonName, as this must be match the root domain for the printer being installed.
The line below will repackage the .pem file as a PKCS #12 archive.
openssl pkcs12 -export -out mycert.pfx -in mycert.pem -name My Certificate
This will require the user to input a password. Make a note of this, as it will be required below.
Log in to the printer WebConfig by entering the IP address of the printer in a browser.
This may require bypassing of security warnings, see article: Fixing TM-Reciept WebConfig “Privacy Error” under Windows
The next step is to select the uploaded certificate.
The certificates in each position can be viewed through the open details button.
The next step is to view the certificate used by the printer. Instructions here are for Chrome, for other browsers see Appendix.
There is no direct means to view or export certificates in Microsoft Edge.
The certificates window will appear. Review the details here.
Hozzáadása a kosárhoz sikeresen megtörtént