Hp Secure Key Manager User Manual Page 109

  • Download
  • Add to my manuals
  • Print
  • Page
    / 327
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 108
The Key and Policy Conguration page enables you to create, import, and manage keys. This page
contains the following sections:
•Keys
Key Properties
•GroupPermissions
Custom Attributes
•RSAPublicKey
•CreateKeys
Import Keys
Keys
The SKM can create and store cryptographic keys (DES, AES, RSA, etc.). A key is composed of two main
parts: the k
ey bytes and the key metadata. The key bytes are the bytes used by the cryptographic
algorithm (together with your data) to produce either plaintext or ciphertext. The key metadata contains
information about the key byte: key name, owner username, algorithm, key size, creation date, group
permissions, and any custom attributes that you create. The metadata also indicates if the key is a
versioned key, deletable, or exportable.
Cryptogra
phic keys can be global or owned by a particular user. Global keys are keys that are available
to everyone, with no authentication required. Additionally, group permissions can be assigned to a key.
For example, you might give members of Group1 permission to export at any time and members of
Group2 permission to export only during a specic time period. Using authorization policies, you can
set usage limitations for keys.
As the administrator of the Secure Key Manager, you can dene how your clients authenticate to the
server. A client might be an application or a database, for example. There are two kinds of client
sessions: authenticated and unauthenticated (global). When a client authenticates, it authenticates
either as a local user or as a user in the LDAP user directory that the server is congured to use. An
authen
ticated client has access to all global keys, all the keys owned by the user, and all keys accessible
to gro
ups to which that user belongs. If a client does not authenticate to the server, then that client has
access only to global keys. On the SKM, keys can be:
Generated on the Management Console by an administrator.
Impor
ted through the Management Console.
Marked as exportable, deletable, neither or both. An exportable key is a key that a client can
export from the server. Similarly, a deletable key is a key that the client can delete from the server.
CAUTION:
Do not delete keys that might be needed to decrypt data at some point in the future. Once you delete
akey
, there is no way to decrypt data that was encrypted with that key. As such, you should be
extremely cautious when making decisions about deleting keys.
The Keys section enables you to view all the keys on the server. You can click a eld name (Key Name,
Owner) to sort the keys by that value; toggle to alternate between ascending and descending order. You
can use the Query eld to select a query that will lter this page by the key metadata. Click Run Query to
actually run the query. The query you apply to this page determines which columns are shown. All keys
and columns are shown by default. (But they are not shown in this screenshot.)
Secure Key Manager
109
Page view 108
1 2 ... 104 105 106 107 108 109 110 111 112 113 114 ... 326 327

Comments to this Manuals

No comments