Hp Secure Key Manager User Manual Page 176

  • Download
  • Add to my manuals
  • Print
  • Page
    / 352
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 175
Configuring the High Security Settings on an SKM
IMPORTANT:
When you enable FIPS compliance on the SKM, the functionality displayed here is disabled. Modifying
any
of the items in the High Security Settings section immediately takes the device out of FIPS
compliance. This section should be used to
review
the key and device security functionality that has
been disabled for full FIPS compliance. When the device is FIPS-compliant, you should not alter these
settings.
To configure the High Security settings on a non-FIPS-compliant SKM:
1. Log in to the Management Console as an administrator with SSL, Advanced Security, and KMS
Server access controls.
2. Navigate to the High Security Configuration page (Security > High Security).
3. Alter the fields in the High Security Settings section as needed.
4. Navigate to the Security Settings Configured Elsewhere section (located below High Security
Settings).
5. Review the settings in this section. To alter these settings, click the fields to access the appropriate
sections.
FIPS Status Server overview
The FIPS Status Server is an http server that provides system status, in the form of the FIPS Status report,
whenever the device is running. The report indicates:
the latest results of all system self-tests
the device state (either error or normal)
the status of FIPS compliance (either yes or no)
The device performs the following tests:
Table 76 FIPS Status Server tests
DescriptionConditionalpower-onTest
Known Algorithm Test for the AES algorithm. This test
is performed at power-on.
XAES Encryption
Known Algorithm Test for the DES algorithm. This test
is performed at power-on.
XDES Encryption
Known Algorithm Test for the DSA algorithm. This test
is performed at power-on.
XDSA Encryption
Known Algorithm Test for the HMAC algorithm. This
test is performed at power-on.
XHMAC Algorithm
Known Algorithm Test for the SHA-1 algorithm. This
test is performed at power-on.
XSHA-1 Algorithm
Known Algorithm Test for the RSA algorithm. This test
is performed at power-on.
XRSA Encryption
Using the Management Console176
Page view 175
1 2 ... 171 172 173 174 175 176 177 178 179 180 181 ... 351 352

Comments to this Manuals

No comments