228
Novell eDirectory 8.8 Administration Guide
no
vd
ocx (
E
NU)
01
F
ebr
ua
ry
200
6
The data in eDirectory can be stored in any of the following ways:
• In the Data Information Base (DIB) or database
• As backup data
• LDIF file
You can encrypt attributes by creating and applying encrypted attributes policies to the servers.
To encrypt the attributes, do the following using iManager:
1
Create and define an encrypted attribute policy.
1a
Select the attributes for encryption.
1b
Select the
encryption scheme
for the attributes.
Refer to
“Creating and Defining Encrypted Attributes Policies” on page 230
for more
information.
2
Apply the encrypted attributes policy to a server.
Refer to
“Applying Encrypted Attributes Policies” on page 230
for more information.
You can also encrypt attributes through LDAP. Refer to
“Managing Encrypted Attributes Policies
Through LDAP” on page 231
for more information.
As a best practice, we recommend you to do the following:
• Mark only sensitive attributes for encryption. Do not mark all attributes for encryption (for
example, public or server readable attributes).
• Use AES while marking an attribute for encryption as it is the strong encryption algorithm.
The rest of this section provides the following information:
•
Section 9.1.1, “Using Encryption Schemes,” on page 228
•
Section 9.1.3, “Accessing the Encrypted Attributes,” on page 232
•
Section 9.1.4, “Viewing the Encrypted Attributes,” on page 233
•
Section 9.1.2, “Managing Encrypted Attributes Policies,” on page 229
•
Section 9.1.9, “Migrating to Encrypted Attributes,” on page 235
9.1.1 Using Encryption Schemes
eDirectory 8.8 provides the highest level of security for an attribute by supporting the following
encryption schemes:
• Advanced Encryption Standard (AES)
• Triple DES
• Data Encryption Standard (DES)
You can select different encryption schemes for different attributes in a single encrypted attributes
policy. For example, in an encrypted attributes policy EP1, you can select both AES as the
encryption scheme for an attribute cubeno and Triple DES for an attribute empno. Refer to
“Creating and Defining Encrypted Attributes Policies” on page 230
for more information.
Summary of Contents for EDIRECTORY 8.8 - GUIDE
Page 4: ...novdocx ENU 01 February 2006...
Page 16: ...16 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 68: ...68 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 90: ...90 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 116: ...116 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 128: ...128 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 184: ...184 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 249: ...250 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 307: ...308 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 333: ...334 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 371: ...372 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 439: ...440 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 519: ...520 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 529: ...530 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 555: ...556 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...