
Installing a Standalone Data Recovery Manager
204
Red Hat Certificate System Administrator’s Guide • September 2005
The first time you generated this certificate is when you installed the Data Recovery
Manager. The default nickname for the certificate is
kraTransportCert cert-<instance_id>
, where
<instance_id>
identifies the CS
instance in which the Data Recovery Manager is installed.
The transport certificate was issued by the CA to which you submitted the certificate
signing request. You might have submitted the request to the Certificate Manager that is
installed in the same instance, internally deployed another CA, or a public CA. To find out
the issuer name, follow the instructions in “Viewing and Deleting Certificate Database
Content” on page 285.
Storage Key Pair
Every Data Recovery Manager you have installed has a
Data Recovery Manager storage
key pair
. The first time you generated this key pair is when you installed the Data Recovery
Manager.
The Data Recovery Manager uses the public component of this key pair to encrypt (or
wrap) end-entity’s encryption private keys during the key archival operation; it uses the
private component to decrypt (or unwrap) the archived key during the recovery operation.
That is, the public key is used to encrypt the key repository the server uses to store
end-entity’s encryption private keys. For more information on how this key pair is used, see
Chapter 6, “Data Recovery Manager.”
Note that the public component of the storage key pair is not certified; there is no certificate
that corresponds to the public key.
Keys encrypted with the storage key can be retrieved only by authorized key recovery
agents. For details, see “Key Recovery Agents and Their Passwords” on page 193.
SSL Server Key Pair and Certificate
Every Data Recovery Manager you have installed has at least one
SSL server
certificate
.
The first time you generated this certificate is when you installed the Data Recovery
Manager. The default nickname for the certificate is
Server-Cert cert-<instance_id>
, where
<instance_id>
identifies the CS
instance in which the Data Recovery Manager is installed.
The Data Recovery Manager’s SSL server certificate was issued by the CA to which you
submitted the certificate signing request. You might have submitted the request to the
Certificate Manager that is installed in the same instance, an internally deployed CA, or a
public CA. To find out the issuer name, follow the instructions in “Viewing and Deleting
Certificate Database Content” on page 285.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...