Hp Secure Key Manager User Manual Page 4

  • Download
  • Add to my manuals
  • Print
  • Page
    / 352
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 3
Creating and installing the SKM Server Certificate .................................................................. 47
Propagating third-party certificates .............................................................................................. 48
Copying the certificates ....................................................................................................... 48
Installing the certificates ...................................................................................................... 49
Enrolling client devices with the SKM ........................................................................................... 49
Verifying that installation and initial configuration is successful ........................................................ 49
3 Performing configuration and operation tasks ....................................... 51
Key and policy procedures ......................................................................................................... 51
Creating a key ................................................................................................................... 51
Importing a key .................................................................................................................. 51
Setting group permissions for a key ...................................................................................... 52
Downloading an RSA key .................................................................................................... 52
Deleting a key ................................................................................................................... 53
Authorization policy procedures .................................................................................................. 53
Creating an authorization policy .......................................................................................... 53
Deleting an authorization policy ........................................................................................... 53
User and group procedures ........................................................................................................ 54
Creating a user .................................................................................................................. 54
Creating a group ............................................................................................................... 54
Adding a user to a group .................................................................................................... 54
Removing a user from a group ............................................................................................. 55
Deleting a user .................................................................................................................. 55
Deleting a group ................................................................................................................ 55
LDAP server procedures ............................................................................................................. 56
Setting up the LDAP user directory ........................................................................................ 56
Testing the LDAP user directory connection ............................................................................. 56
Setting up the LDAP schema ................................................................................................ 56
Setting up an LDAP failover server ........................................................................................ 56
Testing the LDAP failover server connection ............................................................................ 57
Certificate procedures ............................................................................................................... 57
Creating a certificate request ............................................................................................... 57
Creating a server certificate for the SKM ............................................................................... 57
Creating a client certificate .................................................................................................. 59
Creating a self-signed certificate .......................................................................................... 60
Installing a certificate .......................................................................................................... 61
Installing a certificate chain ................................................................................................. 62
Downloading a certificate ................................................................................................... 62
Certificate Authority (CA) procedures .......................................................................................... 63
Adding a CA certificate to the trusted CA list ......................................................................... 63
Removing a CA certificate from the trusted CA list .................................................................. 63
Creating a new trusted CA list profile .................................................................................... 63
Deleting a trusted CA list profile ........................................................................................... 64
Signing certificate requests with a local CA ........................................................................... 64
Viewing the certificates signed by a local CA ........................................................................ 64
Downloading a local CA .................................................................................................... 64
Deleting a local CA ............................................................................................................ 65
Creating a local CA ........................................................................................................... 65
Creating a self-signed root CA ............................................................................................. 65
Creating an intermediate CA request .................................................................................... 65
Installing a CA certificate .................................................................................................... 66
Removing a CA certificate ................................................................................................... 67
FIPS status server procedures ...................................................................................................... 67
Enabling the FIPS status server ............................................................................................. 67
4
Page view 3
1 2 3 4 5 6 7 8 9 ... 351 352

Comments to this Manuals

No comments