Key Recovery Process
Chapter
22
Setting Up Key Archival and Recovery
741
Key Recovery Process
The Data Recovery Manager supports agent-initiated key recovery. In this method
of key recovery, designated recovery agents use the Key Recovery form provided
in the Data Recovery Manager Agent Services interface to process key recovery
requests, list archived keys, and approve recovery. With the approval of a specified
number of agents, an organization can recover keys when the key’s owner is
unavailable or when keys have been lost.
Key Recovery Agents and Their Passwords
Key recovery agents have the authority to retrieve end users’ encryption private
keys. The recovery agent’s role can be performed by any person in your
organization. As system administrator, you can designate one or more individuals
to be key recovery agents. These individuals need to do the following:
•
They must specify a secure password, which in combination with other
recovery agents’ passwords will be used for protecting the database in which
the Data Recovery Manager stores users’ keys. You facilitate this by allowing
each recovery agent to enter a password in the Data Recovery Manager
configuration.
•
They must be available to retrieve your users’ encryption private keys if the
need arises. It isn’t necessary for all key recovery agents to be available for the
key recovery operation. You specify how many agents are required to
authorize the recovery of a key; see “Key Recovery Agent Scheme” on
page 747. However, the specified number of key recovery agents must all
provide their passwords at the same time to authorize the recovery of a specific
key.
The first time you create key recovery agents and specify their passwords is during
the installation of the Data Recovery Manager. However, you can change the
number of recovery agents and their passwords later by modifying it in the Data
Recovery Manager configuration; see “Changing Key Recovery Agents’
Passwords” on page 749.
Secret Sharing of Storage Key Password
The Data Recovery Manager uses the private key of its storage key pair to encrypt
the repository where it store users’ encryption private keys. This requires that the
storage key be well protected. For the protection of the storage key pair, the Data
Recovery Manager supports a password-splitting mechanism called m of n secret
Содержание NETSCAPE MANAGEMENT SYSTEM 4.5
Страница 1: ...Installation and Setup Guide Netscape Certificate Management System Version4 5 October 2001...
Страница 22: ...22 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 32: ...32 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 80: ...Standards Summary 80 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 162: ...162 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 328: ...Password Quality Checker 328 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 434: ...Deleting a Privileged User 434 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 794: ...Managing Log Modules 794 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 796: ...796 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 827: ...827 Part 5 Appendix Appendix A Certificate Download Specification...
Страница 828: ...828 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 834: ...Object Identifiers 834 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 850: ...850 Netscape Certificate Management System Installation and Setup Guide October 2001...