
Token Key Service
232 Red Hat Certificate System Administrator’s Guide • September 2005
Token Key Service
The Token Key Service (TKS) is a CS component that manages the master key(s) and the
transport key(s) required to generate and distribute keys for hardware tokens. TKS provides
the security between tokens and TPS, where the security relies upon the relationship
between the master key and the token keys. TPS communicates with TKS over SSL using
client authentication.
Functions provided by TKS include:
•
Helps establish a secure channel (signed and encrypted) between the token and TPS.
•
Provides proof of presence of the security token during enrollment.
•
Supports key changeover when the master key changes on TKS. Tokens with older
keys will get new token keys.
Because of the sensitivity of the data that TKS manages, TKS should be set up behind the
firewall with restricted access.
Enterprise Security Client
The Enterprise Security Client (ESC) is the CS component that provides the user-facing
portion of the Token Management System. The end user can be issued security tokens
containing certificates and keys required for signing, encryption, and other cryptographic
functions. To make use of the tokens, TPS must be able to recognize and communicate with
them. ESC provides the means by which tokens can be taken through the enrollment
process.
ESC is a Win32 program that communicates over an SSL HTTP channel to the back end of
TPS. It makes use of a web browser container to provide a simple, customizable
HTML-based UI. The native functionality of the tokens is exposed through Javascript
functions called from the HTML UI. After a token is properly enrolled, popular web
browsers such as those from the Mozilla organization can be configured to recognize the
token and use it for security operations.
ESC provides the following capabilities:
•
Allows the user to enroll security tokens so they are recognized by TPS.
•
Allows the user to maintain the security token through its life cycle. For example, ESC
makes it possible to re-enroll a token with TPS.
Summary of Contents for CERTIFICATE 7.1 ADMINISTRATOR
Page 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Page 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...