Overview of Key Recovery
177
Both subsystems subject the request to configured certificate profile constraints at appropriate stages.
If the request fails to meet any of the profile constraints, the subsystem rejects the request.
7.5. Overview of Key Recovery
The DRM supports agent-initiated key recovery. Agent-initiated recovery is when designated recovery
agents use the key recovery form on the DRM agent services page to process and approve key
recovery requests. With the approval of a specified number of agents, an organization can recover
keys when the key's owner is unavailable or when keys have been lost.
7.5.1. Key Recovery Agents and Their Passwords
NOTE
DRM agents are also known as key recovery agents.
Key recovery agents
have the authority to retrieve private encryption keys. Any user can be
designated as a recovery agent. Recovery agents need to do the following:
• Be added to the
Data Recovery Manager Agents
group.
• Obtain a client certificate identifying themselves. The DRM administrator needs to add that user
certificate to the DRM's internal database.
• Be available to retrieve private encryption keys. It is not necessary for all key recovery agents to be
available for the key recovery operation; the required number to authorize the recovery of a key is
configured by the administrator. See
Section 7.5.2, “Key Recovery Agent Scheme”
. However, the
specified number of key recovery agents must all present their certificates to authorize the recovery
of the specific private key.
7.5.1.1. Interface for the Key Recovery Process
With the key recovery form provided in the DRM agent services page, key recovery agents can
collectively authorize and retrieve private encryption keys and associated certificates in a PKCS #12
package, which can then be imported into the client.
The DRM agent's certificate is required to access the key recovery form. For information on DRM
agents, see
Section 17.1.2.3, “Agents”
.
7.5.1.2. Key Recovery Authorization and How it Works
DRM agents can authorize key recovery. This is explained in more detail in the
Certificate System
Agent's Guide
. To authorize key recovery, the required number of recovery agents access the DRM
agent services page and use the
Authorize Recovery
button to enter each authorization separately.
In key recovery authorization, one of the key recovery agents informs all required recovery agents
about an impending key recovery. All recovery agents access the DRM key recovery page. One of
the agents initiates the key recovery process. The DRM returns a notification to the agent includes
a recovery authorization reference number identifying the particular key recovery request that the
agent is required to authorize. Each agent uses the reference number and authorizes key recovery
separately.
Summary of Contents for CERTIFICATE SYSTEM 7.3 - ADMINISTRATION
Page 15: ...xv Index 525 ...
Page 16: ...xvi ...
Page 38: ...Chapter 1 Overview 16 Figure 1 4 Certificate System Architecture ...
Page 82: ...Chapter 2 Installation and Configuration 60 rpm ev rhpki manage ...
Page 154: ...132 ...
Page 194: ...172 ...
Page 238: ...216 ...
Page 244: ...222 ...
Page 246: ...224 ...
Page 286: ...264 ...
Page 292: ...270 ...
Page 318: ...Chapter 13 Certificate Profiles 296 Parameter IssuerType_n IssuerName_n ...
Page 321: ...Freshest CRL Extension Default 299 Parameter PointName_n PointIssuerName_n ...
Page 398: ...376 ...
Page 412: ...390 ...
Page 472: ...450 ...
Page 506: ...484 ...
Page 528: ...506 ...
Page 546: ...524 ...