
Key Recovery Process
198
Red Hat Certificate System Administrator’s Guide • September 2005
Key Recovery Agent Scheme
The
key recovery agent scheme
consists of configuring the Data Recovery Manager to
recognize a fixed number of key recovery agents (a minimum of one) and specifying how
many of these agents are required to authorize a key recovery request before the archived
key is restored. Each recovery agent provides the Data Recovery Manager with a password,
which it uses to generate a unique PIN; the Data Recovery Manager uses the PIN to protect
its storage key pair, which in turn protects end-entity’s keys.
The Data Recovery Manager tracks the key recovery agent password for each agent and
allows you to facilitate changing agents’ passwords; you do not have direct access to these
passwords or the actual storage key password. Each password retrieves only a part of the
private storage key.
You first specified the key recovery agent scheme when you installed the Data Recovery
Manager.
Changing the Key Recovery Agent Scheme
You can change the total number of key recovery agents for a Data Recovery Manager and
the number of key recovery agents required to retrieve an end-entity’s encryption private
key from the Data Recovery Manager’s key repository.
To change the key recovery agent scheme:
1.
Access the CS window (see “Logging Into the CS Console” on page 239).
2.
Click the Configuration tab.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...