Hp Secure Key Manager User Manual Page 131

  • Download
  • Add to my manuals
  • Print
  • Page
    / 352
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 130
Figure 56 Viewing the Create Key section
The following table describes the components of the Create Key section.
Table 37 Create Key section components
DescriptionComponent
This is the name that the server uses to refer to the key. The key name must begin with
a letter, must be between 1 and 64 characters (inclusive), and can consist of only letters,
numbers, underscores (_), periods (.), and hyphens (-).
Key Name
You do not have to specify an owner for the key; if you leave that field blank, the im-
ported key is a global key and therefore accessible to all users. If you want to assign
an owner for the key, you can specify any valid user in the Owner Username field. If
you assign an owner, then that user is the only user who can access the key (unless
the key is given additional group permissions later).
Owner Username
The algorithm might be any one of the following:
AES-256
AES-192
AES-128
DES-EDE-168 (three key triple DES)
DES-EDE-112 (two key triple DES)
DES
RC4-128
RC4-40
HmacSHA1
RSA-2048
RSA-1024
RSA-512
NOTE:
Some of the algorithms listed above will not be available on FIPS-compliant
devices.
Algorithm
A check mark in the box indicates that the key is deletable via an XML request by the
key owner (or any user for global keys). After a key is created, this value may be
changed.
Deletable
A check mark in the box indicates that the key is exportable via an XML request. An
exportable key can be exported by its owner and by members of a group with Export
permission for the key. (A global key marked exportable can be exported by any user.)
After a key is created, this value may be changed.
Exportable
Secure Key Manager 131
Page view 130
1 2 ... 126 127 128 129 130 131 132 133 134 135 136 ... 351 352

Comments to this Manuals

No comments