Key Recovery Process
210
Netscape Certificate Management System Administrator’s Guide • February 2003
3.
If the request passes all the policy rules, the Data Recovery Manager sends a
confirmation HTML page to the web browser the agent used. If the request
fails any of the policy checks, the server logs an appropriate error message.
The confirmation page contains information and input sections:
❍
The information section includes the end-entity’s information.
❍
The input section includes fields for entering the end-entity’s certificate
corresponding to the key that needs to be recovered, the password for the
PKCS #12 package, and key recovery agents’ passwords.
The Data Recovery Manager uses the certificate to construct the
PKCS #12 package (which includes the end-entity’s encryption private key
and corresponding certificate), the PKCS #12 password to encrypt the
PKCS #12 package, and key recovery agents’ passwords to construct the
PIN required to unlock its key repository.
4.
The key recovery agents verify the information in the confirmation page and
enter the certificate in MIME-64 format, the password for the PKCS #12
package, and their individual identifiers and passwords. The Data Recovery
Manager agent submits the page to the Data Recovery Manager.
5.
The Data Recovery Manager matches the key recovery agent information with
its m of n scheme (see “Key Recovery Agent Scheme” on page 211). After
verifying that the required number of recovery agents entered their passwords,
the server uses the agents’ passwords to construct the PIN required to access
the private key repository.
6.
The Data Recovery Manager then retrieves the end-entity’s private key from its
key repository and decrypts it by using the private component of the storage
key pair.
7.
The Data Recovery Manager packages the end-entity’s certificate and the
corresponding private key as a PKCS #12 package and encrypts it with the
PKCS #12 password provided by the recovery agent. It then delivers the
package to the client the recovery agent used to initiate the key recovery
process, and prompts the agent to store the encrypted package. The agent may
choose to store the package in the local file system of the client machine (only if
it has restricted access) or on a floppy diskette.
The recovery agent can then send the encrypted PKCS #12 package and the
corresponding password to an individual by any secure, out-of-band means.
Содержание Certificate Management System 6.1
Страница 1: ...Administrator s Guide Netscape Certificate Management System Version6 1 February 2003...
Страница 28: ...Documentation 28 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 68: ...Support for Open Standards 68 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 82: ...Uninstalling CMS 82 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 166: ...How a Registration Manager Works 166 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 382: ...ACL Reference 382 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 566: ...Managing Policy Plug in Modules 566 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 710: ...1 3 Organization Security Policies 710 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 716: ...Object Identifiers 716 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 762: ...DNs in Certificate Management System 762 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 794: ...Managing Certificates 794 Managing Servers with Netscape Console December 2001...
Страница 810: ...The SSL Handshake 810 Managing Servers with Netscape Console December 2001...
Страница 828: ...828 Netscape Certificate Management System Administrator s Guide February 2003...