Hp Secure Key Manager User Manual Page 170

  • Download
  • Add to my manuals
  • Print
  • Page
    / 327
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 169
Table 80 KMS Server Settings section components
Component Description
IP
This eld species the IP address(es) on which the KMS Server is enabled on the SKM.
The drop-down box consists of all IP addresses bound to the SKM.
IMPORTANT:
We strongly recommend that you select a specic IP address instead of
specifying [All]. If you have four IP addresses bound to the SKM, then the KMS
Server listens for trafc on four different IP addresses; whereas, if you specify a
single IP address, the KMS Server listens for trafc on only one IP address. This
can greatly reduce system vulnerability to outside attacks.
Port
Port on which the KMS Server is listening for client requests. The default port is 9000;
however, you can use any available port.
Use SSL
Specify whether you want to require that clients connect to the KMS Server using an
SSL connection. A check mark in the box indicates that the KMS Server only accepts
trafconanSSLconnection.IftheUseSSLoptionisnotenabled,theKMSServer
will not accept SSL connections.
Server Certicate
If you are requiring SSL, you must provide the certicate that will be used to
authenticate the KMS Server to clients.
Connection Timeout
(sec)
TheConnectionTimeoutvaluespecies in seconds how long client connections can
remain idle before the KMS Server begins closing them. The default value is 60; the
maximum value is 7200 (2 hours). Specifying a value of 0 means that the KMS Server
will not close client connections due to inactivity.
Allow Key and
Policy Conguration
Operations
When this feature is enabled, the KMS Server allows the following actions:
key creation and deletion.
key import.
users with User Administration Permission can create, delete, and modify users and
groups (available only through the XML interface.)
When this feature is disabled, only authentication, cryptographic, and random
number generation requests are available. By default, this feature is disabled.
When using the multiple credentials feature, enabling this option allows users (and
unauthenticated sessions) to perform the actions listed without being subjected to the
multiple credentials rule.
IMPORTANT:
This feature may pose a security loophole. You might allow this access for
automated scripts, or you might disallow it to tighten security.
IMPORTANT:
Enabling this feature on a FIPS-compliant device will take the device out of FIPS
compliance - possibly in a manner that does not comply with FIPS standards.
For information on disabling FIPS compliance, see FIPS Compliance.
Allow Key Export
When this feature is enabled, the KMS Server allows key export.
IMPORTANT:
Enabling this feature on a FIPS-compliant device will take the device out of FIPS
compliance - possibly in a manner that does not comply with FIPS standards.
For information on disabling FIPS compliance, see FIPS Compliance.
Edit Click Edit to modify the KMS Server settings.
KMS Server Authentication Settings
The KMS Server Authentication Settings section, shown here, allows you to specify whether and how
clients authenticate to the KMS Server.
170
Using the Management Console
Page view 169
1 2 ... 165 166 167 168 169 170 171 172 173 174 175 ... 326 327

Comments to this Manuals

No comments