
Deployment Scenarios
52
Red Hat Certificate System Administrator’s Guide • September 2005
Figure 1-3
Certificate Manager and Data Recovery Manager in different instances
The Data Recovery Manager is intended for archival and recovery of private encryption
keys only. Therefore end entities must be using either a browser that supports dual-key
generation or a browser that is using Red Hat Personal Security Manager, which supports
dual keys. When determining the location of a Data Recovery Manager, be sure to look into
firewall considerations, the physical security required for each subsystem, and the physical
location of the Certificate Manager agent, Data Recovery Manager agent, and other persons
responsible for administering the Certificate Manager and recovering keys.
Like a Certificate Manager, a Data Recovery Manager has special physical security
requirements, since a compromised Data Recovery Manager would have devastating
security consequences for your entire PKI. You may therefore want to keep the Data
Recovery Manager in a special locked room or building, a choice that can affect your
deployment strategy.
Summary of Contents for CERTIFICATE 7.1 ADMINISTRATOR
Page 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Page 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...