![Netscape NETSCAPE MANAGEMENT SYSTEM 4.5 Скачать руководство пользователя страница 759](http://html1.mh-extra.com/html/netscape/netscape-management-system-4-5/netscape-management-system-4-5_installation-and-setup-manual_1674705759.webp)
Configuring Key Archival and Recovery Process
Chapter
22
Setting Up Key Archival and Recovery
759
Step B. Facilitate the Key Recovery Agents to Change the
Passwords
During the installation of Data Recovery Manager, after you specified the m of n
scheme, you were also prompted to provide unique passwords for each recovery
agent. It is quite likely that you specified these passwords yourself instead of it
being done by those individuals who have been designated with the key recovery
agents’ role in your organization. Therefore, you must get the designated recovery
agents to change the passwords entered during installation.
•
To understand the significance of key recovery agents’ passwords, see “Key
Recovery Agents and Their Passwords” on page 741.
•
To get the recovery agents to change the passwords, follow the instructions in
“Changing Key Recovery Agents’ Passwords” on page 749.
Step C. Determine the Authorization Mode for Key Recovery
The Data Recovery Manager allows key recovery agents to authorize recovery of
an end user’s encryption private key locally or remotely. The default configuration
is local authorization. It is important that you evaluate both the authorization
modes, and choose the one that is appropriate for your organization. For more
information about this, see “Local Versus Remote Key Recovery Authorization” on
page 743.
If want the key recovery agents to authorize key recovery remotely, be sure to set
them up as Data Recovery Manager agents following the instructions in “Setting
Up Agents” on page 406.
Step D. Customize the Key Recovery Form
Key recovery agents need an appropriate interface to initiate the key recovery
process. By default, the Data Recovery Manager’s Agent Services interface includes
an HTML form (
recoverKey.html
) that allows key recovery agents to initiate the
key recovery process and retrieve users’ encryption keys. For details about this
form, check CMS Customization Guide.
If you want to customize this form to suit your organization, be careful not to
delete any of the information that is vital to the functioning of the form; it is
recommended that you restrict your changes to the content presented in the form.
Step E. Configure Key Recovery Policies
This step is optional.
Содержание NETSCAPE MANAGEMENT SYSTEM 4.5
Страница 1: ...Installation and Setup Guide Netscape Certificate Management System Version4 5 October 2001...
Страница 22: ...22 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 32: ...32 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 80: ...Standards Summary 80 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 162: ...162 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 328: ...Password Quality Checker 328 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 434: ...Deleting a Privileged User 434 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 794: ...Managing Log Modules 794 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 796: ...796 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 827: ...827 Part 5 Appendix Appendix A Certificate Download Specification...
Страница 828: ...828 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 834: ...Object Identifiers 834 Netscape Certificate Management System Installation and Setup Guide October 2001...
Страница 850: ...850 Netscape Certificate Management System Installation and Setup Guide October 2001...