Security Policy, version 1.0
January 31, 2008
HP StorageWorks Secure Key Manager
Page
13
of 26
© 2008 Hewlett-Packard Company
This document may be freely reproduced in its original entirety.
Table 7 – User Services
Service
Description
Keys/CSPs
Authenticate to SKM
Authenticate to SKM with a username and the
associated password
User passwords – read
Generate key
Generate a cryptographic key
Client keys – write
;
PKEK – write.
Modify key meta data
Change the key owner or update/add/delete
the custom attributes
None
Delete key
Delete a cryptographic key
Client keys – delete
;
PKEK – delete.
Query key meta data
Output key names and meta data that the
User is allowed to access
Client keys – read
;
PKEK – read.
Import key
Import key
Client keys – write;
PKEK – write.
Export key
Export a cryptographic key
Client keys – read;
PKEK – read.
Export Certificate
Export a certificate Client
certificate – read
Clone Key
Clone an existing key under a different key
name
Client keys – write, read;
PKEK – write, read.
Generate random
number
Generate a random number
ANSI X9.31 DRNG seed – write,
read, delete
Manage operators
Only users with administration permission can
create, modify, or delete module operators
User passwords – write, delete
2.4.3
HP User Role
The HP User role can reset the module to an uninitialized state in the event that all Crypto Officer passwords are
lost, or when a self-test permanently fails. See Table 8 – HP User Services. The keys and CSPs in the rightmost
column correspond to the keys and CSPs introduced in Section 2.7.1.
Table 8 – HP User Services
Service
Description
Keys/CSPs
Authenticate to the
module
Authenticate to SKM with a signed token
HP User RSA public key – read
Reset factory settings
Rollback to the default firmware shipped with
the module
All keys/CSPs – delete
Restore default
configuration
Delete the current configuration file and
restores the default configuration settings
None