Red Hat CERTIFICATE SYSTEM 7.3 - AGENT GUIDE Manual page 74

Hide thumbs Also See for CERTIFICATE SYSTEM 7.3 - AGENT GUIDE:
Table of Contents

Advertisement

Chapter 7. DRM: Recovering Encrypted Data
Figure 7.1. Search for Keys Page
3. To search by particular criteria, use the different sections of the Search for Keys or Recover Keys
form. To use a section, select the check box for that section, then fill in any necessary information.
• Owner name. Finds an archived key with a specific owner name. The owner name for a key, like
the subject name for a certificate, consists of a string that can be used in searches.
• Key identifiers. Finds an archived key with a specific key identifier or to list all keys within a range
of key identifiers.
• To find a key with a specific key identifier, enter the key identifier in both the upper limit and
lower limit fields in decimal or hexadecimal form. Use 0xto indicate the beginning of a hexa-
decimal number; for example, 0x2A. Key identifiers are displayed in hexadecimal form in the
Search Results and Details pages.
• To find all keys within a range of key identifiers, enter the upper and lower limits of the key
identifier range in decimal or hexadecimal form.
Leaving either the lower limit or upper limit field blank displays all keys before or after the number
specified.
68

Advertisement

Table of Contents
loading

Table of Contents